Managing vulnerabilities is a critical, but time consuming, resource-sucking task. According to research conducted by Enterprise Management Associates, large enterprises typically manage more than 1.3 million vulnerabilities every 30 days and 74% of cyber security pros say they are overwhelmed by the volume of vulnerability maintenance work. While scanners diligently uncover countless vulnerabilities, and assign […]
Happy Cyber Monday, the biggest online shopping day of the year. As shoppers seize the bargain buys and plug in their valuable payment card information, we hope they will take a step back and make sure they are practicing good cyber security hygiene. Retailers should also make sure they are doing their part to protect […]
You may recall our two recently released reports – Reporting to the Board: Where CISOs and The Board are Missing the Mark and How Boards of Directors Really Feel About Cyber Security Reports. They stemmed from two surveys distributed by the third party research firm, Osterman Research, asking security executives and boards of directors […]
September marks the ten-year anniversary of the Payment Card Industry Security Standards Council (PCI SSC), a group created by the major card brands to strengthen the protection of payment card data.
Today we unveiled a new version of our Bay Dynamics flagship cyber risk analytics platform, Risk Fabric®. We implemented the enhancements to help IT and security practitioners ease some of their greatest pains.
Bay Dynamics is headed back to Black Hat August 1-4 where the best in security – from hackers to C-level executives - gather in the heat of the Vegas desert to discuss the hottest security issues. In the 19 years since Black Hat began, a lot has changed in the industry.
Our Bay Dynamics co-founder and CEO Feris Rifai recently spoke at the 2016 SINET Innovation Summit about this communication gap and how CISOs can shift their approach so that they think and speak risk.
Security and risk organizations place a lot of focus on vulnerabilities, and rightly so. These nasty flaws in systems and applications – if leveraged by miscreants – can result in millions of dollars in losses, in addition to significant reputational damage. Enterprises, both large and small, all have vulnerability management programs. However, there are significant […]
Check out our new “intergraphic” – an interactive graphic - that takes you inside the cockpit of a CISO.
The people within an organization that are closest to the crown jewels have to take an active role in guarding that information in the digital world, the same way they would in the physical world.