Blog

Trends in Ransomware What to Know About RaaS

Trends in Ransomware: What to Know About RaaS

by Kristen Hicks | April 8, 2022 | Cyber Crime, Cyber Risk, Data & Cybersecurity

By now we’ve all heard of SaaS (software as a service) and many have heard of IaaS (Infrastructure as a Service), PaaS (Platform as a Service), or the term that contains them all: XaaS (anything as a service). The as-a-Service business model, which usually has customers paying a subscription rate ....

scenario planning

Scenario Planning For Emerging Uncertainties

by Brian Kropp, Ceree Eberly | April 7, 2022 | Business Continuity, Business Resiliency, Incident Reponse

As the war in Ukraine enters its second month, and China implements its most severe lockdown since the CoVID-19 pandemic began, it is imperative that businesses with international operations rethink their scenario planning. The pandemic, followed by the war, has exposed the downside of choosing e ....

Spring4Shell

Spring4Shell – What the H…?

by Tom Garrubba | April 5, 2022 | Vendor Risk Management

As numerous reputable security and analysis organizations continue to weigh the criticality of the recent Spring4Shell (aka: “SpringShell”) vulnerability, Shared Assessments has opted to take a neutral stance as to its prevalence and criticality. Regardless of this, it is crucial to continuously ....

SIG Scoping

Shared Assessments 2022 SIG Manager Scoping Template

by David Lundquist | April 4, 2022 | Standardized Information Gathering (SIG), Tools & Templates

How to Scope a Custom SIG Questionnaire The video guides you through the creation of a custom SIG scoping template, which is then used to generate a custom SIG questionnaire.   Functionality of the SIG scoping template Scoping is the process of selecting risk-based questions that ....

Current and Evolving Cyber Supply Chain Risks

Current and Evolving Cyber & Supply Chain Risks

by Mark Rudio | March 31, 2022 | Supply Chain

In a recent Fireside Chat presented by Shared Assessments Committees’ Leadership on “Current and Evolving Cyber & Supply Chain Risks,” conversation topics included Conti, CISA, the geopolitics of SWIFT payments, chip shortages, and how the war in Ukraine might influence China’s actions t ....

The Cyber Side to the Russia Ukraine Conflict

The Cyber Side to the Russia-Ukraine Conflict

by Kristen Hicks | March 31, 2022 | Data & Cybersecurity

For the past few weeks, a worldwide audience has watched in fear and shock as war unfolds in the streets of Ukraine, causing thousands of casualties and deaths and displacing thousands of people. This is the bloody side of war, the one some experts have hoped we’d see less of worldwide as more cou ....

Whats Next For Cyber Warfare

What's Next For Cyber Warfare?

by Kristen Hicks | March 23, 2022 | Cyberwarfare, Data & Cybersecurity

For the past few weeks, a worldwide audience has watched in fear and shock as the war unfolds in the streets of Ukraine, causing thousands of casualties and deaths and making many more refugees. This is the bloody side of war, the one some experts have hoped we’d see less of worldwide as more coun ....

SIG SCF Featured Image

SIG And SCF: Mapping Strong Connections

by Sabine Zimmer | March 22, 2022 | Tools & Templates

Shared Assessments is pleased to announce that the Standard Information Gathering Questionnaire (SIG) mapping is now incorporated into the Secure Controls Framework (SCF) catalog of controls. This was a collaborative endeavor between Shared Assessments and the SCF. Benefit of Using SCF Alongside ....

How to Strengthen Cybersecurity Defenses

How to Strengthen Cybersecurity Defenses

by Eric Krell | March 21, 2022 | Data & Cybersecurity

Where are the war-related cyber attacks? It’s an unnerving question that has information security and third party risk management (TPRM) professionals knocking on wood. There are several viable answers to the question, the most important of which may be that there are better, more practical quest ....

Continuous Monitoring How to Get It Right

Continuous Monitoring: How to Get It Right

by Kristen Hicks | March 16, 2022 | Business Resiliency, Data & Cybersecurity

The work of third-party risk management (TPRM) is ongoing. The moment a business ceases to actively work on protecting itself from risk, it falls behind. In part, that’s because world events and the tactics employed by cybercriminals are continually changing in ways that impact third-party risk. B ....

« Previous PageNext Page »