Authorities on Risk Assurance

The Shared Assessments Blog

Viewing Category: Cyber Attacks

Third Party IoT Security: Interpreting Survey Results in the Context of a Shifting Security Paradigm

Published on July 17, 2017 By | Posted in: Cyber Attacks, Data Protection, Internet of Things (IoT), News, Third Party Oversight, Third Party Risk, Vendor Risk Managment, Vendor Security, Vendor Threat

Shared Assessment’s just published Ponemon research report The Internet of Things (IoT): A new Era of Third Party Risk provides a great snapshot of current IoT Risk management both within an organization’s four walls and with the third parties that so often support mission critical activities. Many of the report’s findings are troublesome: the lack […]

Ransomware – Is it Possible to Avoid Being a Target?

Published on May 22, 2017 By | Posted in: Cyber Attacks, News, Ransomware, Third Party Risk Management

This most recent and extraordinary ransomware attack shows the extent to which thieves will go and the impacts this can have on a global scale. While certain types of organizations have become favored targets for hackers, this particular event underscored the fact that everyone is at risk. In the now infamous WannaCry attack, organizations, agencies […]

Shared Assessments Program Addresses Recommendations of Russian Hack Report for Improved Security

Published on January 13, 2017 By | Posted in: Advanced Persistent Threats, Cyber Attacks, Cyber Crime, Cybersecurity, Hacking, Program Tools, Security, Third Party Risk Management

The Threat Horizon The December 29th joint analysis report (JAR) GRIZZLY STEPPE – Russian Malicious Cyber Activity, contains specific indicators of cyberattacks and steps organizations can take to mitigate the “the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. […]

At the Heart of the Cyber Security Skills Shortage

Published on September 7, 2016 By | Posted in: Blog, Cyber Attacks, Cybersecurity, Hacking

Three recent studies demonstrate that organizational and IT department leadership sit squarely at odds with several important challenges to improving IT-related risk postures: Predictions that organizations do not plan to increase the level on hand security expertise; A well-documented and looming shortage of cybersecurity and IT professionals; and Just 18% of employers reported willingness to […]

APTs: The Newer, Smarter, and Actually Successful Wile E. Coyote

Published on January 15, 2016 By | Posted in: Advanced Persistent Threats, APT, Cyber Attacks, Cyber Crime, Cyber Risk, Cybersecurity

Remember the old Looney Tunes cartoons where Wile E. Coyote nearly destroys himself in attempt after fruitless attempt to capture the Road Runner? The Road Runner seems to have a sixth sense when a trap is sprung across his path and always escapes unscathed. Well, when it comes to cyber attacks, threat actors are far […]

Shared Assessments Licensee ControlCase
Shared Assessments Logo dtcc
Shared Assessments Logo sei
Shared Assessments Licensee ZS logo
Shared Assessments Licensee Pivot Point Security
Shared Assessments Logo pwc
Shared Assessments Logo Deluxe Corp
Shared Assessments Licensee TD Ameritrade
Shared Assessments Logo usbank
Shared Assessments Logo radian
Shared Assessments Licensee Bank of the West
Shared Assessments Logo yodlee
Shared Assessments Logo Iron Mountain
Shared Assessments Program licensee Churchill & Harriman logo
Shared Assessments Logo Bank Of New York Mellon
Shared Assessments Licensee Protiviti
Shared Assessments Logo Ernst & Young
intralinks-logo
Shared Assessments Logo Deloitte
Shared Assessments Logo first data
Shared Assessments Licensee Rsam
Shared Assessments Licensee Power Advocate
Shared Assessments Licensee Lockpath
MetricStream logo
Viewpoint Logo