πŸ”’
There are new articles available, click to refresh the page.
Before yesterdayVerSprite

Smishing and Vishing Explained: How Phone-Based Cyber Attacks Work

26 October 2021 at 20:41

Smishing and vishing are types of phishing attacks that use text messaging (SMS) and voice calls to manipulate victims. These types of attacks increasingly target individuals and companies at an alarming rate. Find out how to spot a smishing text or vishing voicemail in this article.

The post Smishing and Vishing Explained: How Phone-Based Cyber Attacks Work appeared first on VerSprite.

What Is A Phishing Attack & How to Spot Phishing Emails

8 October 2021 at 18:55

Phishing is a top concern for businesses as ransomware by phishing attacks increase. Learn what a phishing attack is, common types of phishing, and how to spot phishing emails. Share this article with your employees to bring greater awareness to this issue.

The post What Is A Phishing Attack & How to Spot Phishing Emails appeared first on VerSprite.

How to Get Executive Buy-in for Your Security Program Budget

5 October 2021 at 11:55

It can be difficult to make a case for security spending. In this article, VerSprite discloses our risk-based approach to getting security program budgets approved by tying risks to business goals.

The post How to Get Executive Buy-in for Your Security Program Budget appeared first on VerSprite.

How to Create A Strong Password

1 October 2021 at 14:50

Creating strong passwords doesn't have to be hard. Use our simple tips to create a good password that can't be hacked.

The post How to Create A Strong Password appeared first on VerSprite.

Understanding Physical and Cyber Threats to the Financial Sector

As physical and cyber attacks increase against the financial industry, VerSprite's Threat Intelligence Group has been tracking the patterns attackers leave. In this article, VerSprite uses an attack tree to map the top methods, motives, and threat organizations the financial industry should be aware of.

The post Understanding Physical and Cyber Threats to the Financial Sector appeared first on VerSprite.

Vendor Risk Assessment Services vs. Third-Party Risk Management Software (VRA vs. TPRM)

8 February 2021 at 12:31

What's the best practice to manage third-party vendor risks? In this eBook, VerSprite's GRC team compare 7 factors to help you determine if Third-Party Risk Management software (TPRM) or Vendor Risk Assessment services (VRA) is right for you. Included: VRM Checklist

The post Vendor Risk Assessment Services vs. Third-Party Risk Management Software (VRA vs. TPRM) appeared first on VerSprite.

Fintech Cybersecurity Case Study CreditShop

26 January 2021 at 01:40

In this case study, CreditShop's CISO gives an inside look at how he uses red teaming exercises to shape their security roadmap and why it's critical for financial organizations to go beyond security compliance.

The post Fintech Cybersecurity Case Study CreditShop appeared first on VerSprite.

2021 Business Security Threats Briefing

20 January 2021 at 15:28

In this video, Envisions author, Balam Mendoza, and VerSprite CEO, Tony UcedaVΓ©lez, discuss the major topics within our 2021 Threat Report and how security teams can use threat reports when planning their security protocols for the year.

The post 2021 Business Security Threats Briefing appeared first on VerSprite.

VerSprite Cybersecurity Discusses Sunburst and Vendor Supply Chain Attacks

28 December 2020 at 16:24

Sit back and listen to part 2 of our discussion on FireEye's breach, SolarWinds Sunburst supply chain attack. We'll cover updates, how to protect against supply chain attacks with organizational threat models, and debate on the risks and benefits of an open disclosure community.

The post VerSprite Cybersecurity Discusses Sunburst and Vendor Supply Chain Attacks appeared first on VerSprite.

  • There are no more articles
❌