Tag: party risk
-
Cisco Talos Blog: Maturing the cyber threat intelligence program
Source URL: https://blog.talosintelligence.com/maturing-the-cyber-threat-intelligence-program/ Source: Cisco Talos Blog Title: Maturing the cyber threat intelligence program Feedly Summary: The Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) helps organizations assess and improve their threat intelligence programs by outlining 11 key areas and specific missions where CTI can support decision-making. AI Summary and Description: Yes **Summary:** The Cyber Threat…
-
The Register: Criminal background checker APCS faces data breach
Source URL: https://www.theregister.com/2025/08/22/apcs_breach/ Source: The Register Title: Criminal background checker APCS faces data breach Feedly Summary: The attack first affected an upstream provider of bespoke software Exclusive A leading UK provider of criminal record checks for employers is handling a data breach stemming from a third-party development company.… AI Summary and Description: Yes Summary: The…
-
The Register: Qantas begins telling some customers that mystery attackers have their home address
Source URL: https://www.theregister.com/2025/07/09/qantas_begins_telling_customers_data/ Source: The Register Title: Qantas begins telling some customers that mystery attackers have their home address Feedly Summary: Plus: Confirms less serious data points like meal preferences also leaked Qantas says that when cybercrooks attacked a “third party platform" used by the airline’s contact center systems, they accessed the personal information and…
-
The Register: ConnectWise customers get mysterious warning about ‘sophisticated’ nation-state hack
Source URL: https://www.theregister.com/2025/05/30/connectwise_compromised_by_sophisticated_government/ Source: The Register Title: ConnectWise customers get mysterious warning about ‘sophisticated’ nation-state hack Feedly Summary: Pen tester on ScreenConnect bug: This one ‘terrifies’ me ConnectWise has brought in the big guns to investigate a “sophisticated nation state actor" that broke into its IT environment and then breached some of its customers.… AI…
-
SDx Central: Cloud Security Alliance partners with Whistic to enhance AI security practices
Source URL: https://www.sdxcentral.com/news/cloud-security-alliance-partners-with-whistic-to-enhance-ai-security-practices/ Source: SDx Central Title: Cloud Security Alliance partners with Whistic to enhance AI security practices Feedly Summary: Cloud Security Alliance partners with Whistic to enhance AI security practices AI Summary and Description: Yes Summary: The partnership between the Cloud Security Alliance (CSA) and Whistic focuses on promoting secure practices for generative artificial…
-
CSA: 2025 Trust Trends Shaping Security Strategies
Source URL: https://www.vanta.com/resources/security-trends-2025 Source: CSA Title: 2025 Trust Trends Shaping Security Strategies Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses the evolving landscape of security and trust for businesses in 2024, emphasizing the challenges posed by increased cybersecurity threats, the rapid adoption of AI technologies, compliance burdens, and third-party vendor risks. It…
-
CSA: 5 Security Questionnaire Steps to Automate Today
Source URL: https://www.vanta.com/resources/steps-of-questionnaire-process-to-automate Source: CSA Title: 5 Security Questionnaire Steps to Automate Today Feedly Summary: AI Summary and Description: Yes Summary: The text emphasizes the increasing importance of security and compliance practices due to rising third-party breaches, highlighting a growing reliance on security questionnaires. It outlines the burdens these questionnaires place on organizations and suggests…