contact us

How Automated Risk Prioritization Could Reduce the Security Skills Shortage

Cybersecurity has never been easy, but new challenges and tools are shaping today’s security practices.One challenge is the accelerating growth of an organization’s attack surface. Wide adoption of hybrid and multi-cloud architectures is one...
Quantifying Data Risk in Health Care

Quantifying Data Risk in Health Care

Latest Article written by: Joseph Weinberg (Board Member, TimiCoin/TimiHealth) and Sean Murphy (Vice President, Chief Information Security Officer, Premera Blue) The health-care industry has long been subject to rules about the protection of patients’ personal data.... read more
Methods for Quantifying Technology Risk

Methods for Quantifying Technology Risk

Latest Using Technology Risk Metrics to Make Business Decisions Article written by: Eric Vanderburg (Vice President, Cybersecurity, TCDI), Koushik Subramanian (CISO – UI Labs and Director Of Manufacturing Cybersecurity – DMDII, UI LABS), Vito Sardanopoli... read more
Quantifying Enterprise Technology Risk

Quantifying Enterprise Technology Risk

Latest Methods for Quantifying Technology Risk Article written by: Eric Vanderburg (Vice President, Cybersecurity, TCDI), Koushik Subramanian (CISO – UI Labs and Director Of Manufacturing Cybersecurity – DMDII, UI LABS), Vito Sardanopoli (Principal and... read more
Rating Criticality of Data Assets

Rating Criticality of Data Assets

Latest Article written by: Genady Vishnevetsky (Chief Information Security Officer, Stewart Title), Cory Missimore (Assistant Manager, Information Security, Bloomberg BNA), and Bradley Schaufenbuel (CISO, Paylocity)There are no standard methods for calculating the... read more
Prioritize Your Remediation Across a Growing Attack Surface