Welcome to the Safe Security Resource Center – bringing you the latest news, research and actionable insights on Cyber Risk Quantification and Management. Explore our hub of insightful content designed to help you understand, manage, and transfer your cyber risk – carefully curated for CISOs, Board Members, and Risk Management professionals. From cyber threat intelligence to cyber insurance, and no matter what stage you're at in your Cyber Risk Quantification journey, our Resource Center has you covered.
Putting a Price on Risk: How to Prioritize Cybersecurity Budgets in 2024
Explore a strategic roadmap to prioritize cybersecurity spending based on the financial risk to the business and communicate that risk to the board.
Announcement of C-Risk and Safe Security Partnership
Ventiv Technology Launches Global Partnership with Safe Security
Are You Ready to Comply with the SEC ‘Material’ Cyber Risk Rules?
In this whitepaper, find the answers to 5 critical cyber risk management questions to ask your organizations about the SEC's cyber risk rules.
Accelerating GenAI Adoption Through Risk Management
Hear from experts: Safely accelerate your GenAI adoption by knowing the top enterprise GenAI risk scenarios and learning how to measure and manage them using a data-driven and automated approach.
Roadmap to Success: 5 Best Practices for CRQM Implementation
Whether starting or maturing your CRQ journey, discover the 5 best practices to implement a successful CRQM program in your organization.
The CRQM Program Development Blueprint
Discover the guiding principles to implement a 5-step CRQM program in your organization, guided by Safe Security's expertise.
FAIR™ Automation — Solved
Discover how the FAIR Model's automation by SAFE transforms cyber risk management and enables your business to address cybersecurity challenges in real-time.
How FAIR-MAM Helps to Assess Quantitative and Qualitative Materiality
Explore how FAIR-MAM enables you to accurately measure probable loss, respond to data breaches, track top cyber risks, & determine material impact for SEC.
From Data to Disclosure: Decoding Cyber Risk Reporting for the SEC and Board
Watch on-demand and prepare to meet and exceed the SEC’s Cyber Risk Rules before it’s too late.
SEC Compliance Dilemma: Wait and See and Risk Personal Liability?
Learn from experts – including a former SEC division chief on how your company can meet and exceed the SEC’s Cyber Risk Rules.
CISO’s Toolkit: Ace Cyber Risk Reporting to the Board
Explore the strategies and best practices security and risk leaders need to create a robust and effective board-level cybersecurity reporting.
How to Achieve SEC Compliance with Real-time and Automated FAIR Solution
Join Jack Jones, author of FAIR, to learn how to meet the new SEC Cyber Rules with an AI-driven and quantitative cybersecurity plan based on the FAIR Model.
Safe Security at the FAIR Conference 2023
Safe Security to share expertise with CISOs on automating cyber risk quantification, risk analysis with AI, cybersecurity controls analytics, and more
Top 5 Reasons to Attend the 2023 FAIR Conference
Explore how FAIR is evolving to meet industry requirements and the role of AI-driven Cyber Risk Management in meeting regulatory requirements
Safe Launches Industry’s First Implementation of FAIR-MAM™
Safe Security Launches Industry’s First Implementation of the FAIR Materiality Assessment Model (FAIR-MAM™) for Assessing Material Cyber Risk
Getting a Handle on Cyber Risk for Boards with Cyber Risk Quantification
Your Board is under pressure from regulatory authorities. Explore how the FAIR framework and AI-driven Cyber Risk Quantification can empower your Board.
CISO's Playbook For SEC Cyber Risk Compliance
From December 2023, public companies will be mandated to disclose all material cybersecurity incidents to the SEC. Use this playbook to achieve compliance.
Meeting the SEC Cyber Rule Compliance Deadline
Explore the core requirements for SEC Cyber Risk Compliance and how to measure materiality using predictive, analytics-driven Cyber Risk Quantification.
RiskLens, a Safe Security Company, Named a Leader in a Cyber Risk Quantification Report by an Independent Research Firm
The Forrester WaveTM: Cyber Risk Quantification analyzes CRQ market trends & compares the top 8 vendors to help you choose the best solution for your business.
The Safe x RiskLens Acquisition Will Transform Cyber Risk Management
The SAFE Platform will embed the FAIR Model to equip businesses with the industry's first automated and AI-driven Cybersecurity Risk Management solution.
Safe Security Acquires RiskLens to become the Undisputed Leader in the $4B Cyber Risk Quantification and Management (CRQM) Market
The acquisition combines the FAIR Model & AI-driven Cyber Risk Quantification & Management, enabling customers to predict & prevent cybersecurity breaches.
Safe Security Acquires RiskLens to become the Undisputed CRQM Leader
The integration of the two leading industry players delivers enhanced value to organizations looking to optimize their cybersecurity strategy and take control of their risk management processes.
Safe Security Joins Forces with MITRE Engenuity’s Center for Threat-Informed Defense to Help Organizations Take a Predictive Security Posture
Safe's research sponsorship with MITRE's CTID will drive collaborative research and innovation and encourage the global adoption of Cyber Risk Quantification.
SAFE Equips Global Organizations to Meet the New SEC Guidelines
SAFE empowers companies to accelerate response time to cyber threats, understand the criticality of cyber risks, & communicate risk consistently to the board.
Safe Security Joins MITRE Engenuity's Center for Threat-Informed Defense
Safe Security has joined MITRE's Center for Threat-Informed Defense as a research sponsor to share expertise in advanced cyber risk management.
Top Takeaways from Gartner® Security and Risk Management Summit 2023
Discover how people are thinking about the SEC cyber risk proposals, and how SafeGPT featured in 'The Future of Security' by Gartner VP Analyst, Patrick Hevisi.
Safe Security Announced as Launch Partner for Wiz Integrations (WIN) Platform
The Safe x Wiz partnership will help businesses to maximize cloud security investments, & allow them to view their overall cybersecurity risk in real-time.
Safe Announced as Launch Partner for Wiz Integrations (WIN) Platform
This integration allows businesses to view their overall cybersecurity risk, including top issues detected by Wiz, on SAFE's Cyber Risk Management Platform.
Mosaic, Safe Security Launch Pioneering Cyber Incentive, Rewarding Customers with Policy Credits and Broader, Bespoke Coverage
Mosaic x SafeInside customers will benefit from insurance premiums directly linked to their respective, quantified cyber status - their SAFE Score.
Safe Security Unveils Industry’s First AI-Fueled Cyber Risk Cloud of Clouds Platform with SafeGPT To Answer Cyber Questions a Hundred Times Faster
Using SafeGPT and the Cyber Risk Cloud of Clouds, organizations can get answers to their most pressing cyber risk questions 100x faster.
Datasheet: The SAFE Cyber Risk Quantification Platform
Discover how the SAFE Platform delivers a data-driven, real-time solution for measuring, managing, and mitigating cyber risk.
Mosaic Launches Global Primary Cybersecurity Coverage with Safe Security Partnership
The specialty insurer launched the new coverage under a pioneering partnership with Safe to embed real-time cyber-risk data into its underwriting process.
ReBIT’s Founding CEO Nandkumar Saravade joins Safe Security’s Board of Advisors to further advance Cyber Risk Resiliency of Indian Enterprises
Nandkumar Saravade, the CEO of Reserve Bank of India's ReBIT, joins the Advisory Board of Safe Security, an AI-based cyber risk management company.
How to Ace Board Reporting - Direct From the Experts
Experts from across industries share their winning tactics to help CISOs, CFOs, and Board Members ace cyber risk board reporting.
Safe Security Raises $50 Million Series B Round for AI-Driven Platform to Manage and Mitigate Cyber Risk
Cyber Risk Quantification company, Safe Security, closes $50M Series B funding led by Sorenson Capital, along with Eight Roads, Telstra Ventures, and WTI.
Cyber Risk Communication and Understanding in Healthcare: How Do We Improve It?
Cyber Risk Matters Webcast: Cooper Healthcare's CIO Dustin Hufford discusses how cybersecurity risk in healthcare can be measured, mitigated, and transferred.
Managing Real-Time Cyber Risk Exposure Using Tenable.io and SAFE
SAFE's API-based integration with Tenable.io gives businesses visibility of their cyber risk exposure mapped to the MITRE ATT&CK Framework.
Safe Security and AkinovA partner to benefit businesses and investors looking to analyse cyber risk
The new partnership will provide AkinovA access to Safe Security’s advanced cyber risk quantification (CRQM) solution to analyze cybersecurity risk.
3 Cyber Insurance Questions for Brokers
A standalone cyber policy is now a must-have for more and more small businesses, and even large enterprises.
BW Disrupt Founder's Lounge
Saket Modi – CEO of Safe Security, discusses the current cybersecurity landscape and how businesses can proactively manage cyber risk using CRQM.
Healthcare Providers and Hospitals Under Ransomware's Siege
According to the FBI and Internet Crime Complaint Center, 25% of ransomware complaints involve healthcare providers.
Making Data-Driven Decisions on Cyber Risk: Risk Quantification
Using CRQM, learn how healthcare leaders can quantify when a breach could occur in their environment, and its potential dollar / operational impacts.
Mosaic Partners With Safe Security on Real-Time Cyber Risk Evaluation
Mosaic Insurance has launched a pioneering platform powered by Safe Security to help underwriters evaluate cybersecurity risk for brokers and insureds
Board Report Template: Make your Risk Reporting Board-Ready
Security leaders need to translate cybersecurity risk into its dollar impact. Use this FREE Board Report template to communicate cyber risk efficiently.
How to Measure, Manage, and Mitigate Third Party Risk in Real-Time
Security Risk Ratings solutions could be providing you with a false sense of security. Learn how Cyber Risk Quantification solves the problem and get started.
Infographic for Chief Finance Officers: How CFOs Can Leverage Cybersecurity to Achieve Greater Success
Get the low-down on how to empower your Chief Finance Officer (CFO) to champion cybersecurity risk management, even though they're not technical experts.
Snapshot: Developments in Cyber Risk Regulation, H2-2022
Explore the global developments in regulatory guidelines, what they mean for your organization, and how cyber risk quantification can address these challenges.
Safe Security Expands to 50 Technology Integrations to Make Cyber Risk Quantification and Management More Trustworthy and Accessible to All
The SAFE CRQM Platform can now ingest API signals in under 5 minutes from leading platforms like AWS, GCP, Microsoft Azure, Qualys, Tenable, and CrowdStrike.
A Year in Review: 8 Reasons Why the Time is Now for Cyber Risk Quantification and Management
Eight events that propelled Cyber Risk Quantification and Management into the spotlight during 2022, proving that it is no longer an option, but the solution.
Cyber Risk Quantification and Improving Business Communication
Expert Insights interviews Saket Modi, CEO and Co-Founder of Safe Security, to discuss the importance of cyber risk quantification.
2023 is the Year of Cyber Risk Quantification
John Chambers, Founder and CEO of JC2 Ventures, writes about why businesses need to invest in Cyber Risk Quantification and Management in 2023.
TechCrunch: 2023 will be the Year of Cyber Risk Quantification
CRQ is the hottest thing in cybersecurity right now. This article by John Chambers first appeared in TechCrunch on November 7, 2022.
Reporting Cyber Risk: The Top 5 Dashboards for CISO Success
The five real-time dashboards CISOs need to visualize, prioritize, and manage cyber risk and engage in dollar-driven conversations with the board.
Safe Security Wins 2022 CISO Choice Award in Risk Management for Unique Approach to Cyber Risk Quantification
The CISO Choice Awards program honors leaders in key technology and business categories, selected by a board of CISO judges based on real-world experience.
Services You Should Expect From your Cyber Insurance Provider
The cyber insurance market is still trying to work out what it is actually offering. Not so long ago, it was a simple product, available at a reasonable price under simple, easily comprehensible conditions.
How Easy is it to Deploy SAFE?
Discover easy it is to deploy SAFE and start your Cyber Risk Quantification and Management journey (CRQM) in under 4 weeks.
Safe Security and Intuitive.Cloud announce a partnership to offer a New Cyber Risk Quantification Offering
Safe Security announces a new partnership with Intuitive.Cloud to provide Cyber Risk Quantification solutions in the United States.
Factsheet: Return On Security Investment (ROSI)
Justifying the Return on Security Investments (ROSI) is more efficient with Safe Security's ROSI module. Learn how you can experience the benefits for ROSI.
Safe Security ROSI Calculator Empowers CISOs and CFOs to Quantify the Reduction in Cyber Risk
Safe Security announced the Return on Security Investment (ROSI) Calculator, a new module of the SAFE platform.
How to Manage Risk From Attack Surface Expansion
The attack surface of every organization across the world is growing in complexity. Explore what this means for managing your cybersecurity risk.
Safe Security Launches Return on Security Investment Calculator to Help Organizations Maximize Returns on Cybersecurity Budgets
Safe Security announces the launch of the Return On Security Investment Module within the SAFE platform.
Interactive Cost Model: New Backtesting Shows High Accuracy in Financial Loss Prediction
Safe Security's Interactive Cost Model was tested against eight recent ransomware attacks for which financial impact data was available.
The Uber Breach: Why Real-Time Monitoring of Signals Across Your Attack Surface is Crucial
The cyber attack on Uber demonstrates that organizations must monitor their expanding attack surface and correlate your security signals in real-time.
Business operations and technology leader Suja Chandrasekaran joins Safe Security’s Board of Advisors
Suja Chandrasekaran joins Safe Security's Board of Advisors. She brings a wealth of experience as a global business operations and technology leader.
Enterprise Management Associates: Impact Brief on Safe Security
Safe Security, an American company headquartered in Palo Alto that specializes in cybersecurity and digital business risk quantification, recently announced the release of several new assessment
Empowering the CFO to Champion Cyber Risk Management
CFOs play a pivotal role in determining the cyber health of a company and ensuring cybersecurity investment matches potential risks.
Super Cyber Friday with David Spark
Saket Modi joined David Spark and Olivia Rose discussing all things cyber risk management, why it's broken, and how you can fix it.
Measure, Manage, Mitigate Cyber Risk
In this podcast, Saket Modi talks about cybersecurity in healthcare and the importance of quantification and management to ultimately mitigate cyber risks.
From Bits & Bytes to Dollars & Cents: Taking a New Approach to Cybersecurity Risk Management
The conversation around cyber security has changed, from prevention to risk management. But what is the financial impact of this new approach?
Lloyds of London Excludes State-Backed Cyber Attacks from Insurance Coverage
Find out what this major policy exclusion means for global businesses and the insurance industry, as we explore the solution.
Factsheet: The Interactive Cost Model (ICM)
Introducing the industry's first fully transparent Interactive Cost Model by Safe Security. Convert your cybersecurity risk into its potential financial impact.
Halve the Cost of a Data Breach with Cyber Risk Quantification
The Ponemon Institute and IBM list CRQ and security AI and automation as the top 2 methods for reducing breach losses in the 2022 Cost of a Data Breach report.
Safe Security Introduces Free Assessments to Provide Trusted Financial Risk Calculations for Cyber Attacks and Cyber Insurance Discussions
Introducing the free-to-use Interactive Cost Model, the first of its kind in the industry, and its Cyber Insurance Assessment for Cloud-Based Enterprises.
Interactive Cost Model
Try the industry's first interactive, transparent cost model - calculating a trustable, defensible estimate of your financial risk due to cyber attack.
Microsoft Exchange Server-Side Forgery Request (Proxylogin)
This security research article explores how the CVE-2021-26855 vulnerability functions, how it impacts systems and users, and how you can mitigate the risk.
Cyber Insurance Assessment
Delivering CISOs, CROs, board members and key decision makers the insights they need to understand what cyber risk means to their business.
Battlecard for CISOs: Pitching the Case for Cyber Risk Quantification and Management
Are you pitching the case for Cyber Risk Quantification to your Board? Use this specially curated CISO battlecard to gain their confidence and secure buy-in.
“Dirty Pipe” Linux Local Privilege Esacalation [CVE-2022-0847]
Read this security research blogpost to learn how the CVE-2022-0847 can be exploited using a proof of concept, and how it affects you.
Critical RCE Vulnerability in F5 BIG-IP [CVE-2022-26352]
A research case study on F5’s BIG-IP product critical RCE vulnerability – describing its function, impact, and possible mitigation strategies.
Safe CRQ Calculator
Ever wondered how exposed your industry is to cyber risk, or how it compares to others? Use our FREE Cyber Risk calculator to find out.
Safe Security Publishes Results of New Predictive Model, Highlighting the Cyber Exposure of Specific Industries Over the Next 12 Months
Safe launches its FREE cyber health CRQ calculator to quantify an industry’s cyber health based on its external threat landscape and inherent risk profile.
Critical RCE in dotCMS Content Management Software
An in-depth analysis of a critical RCE in the dotCMS Content Management Software. Find out how the vulnerability works and how to manage the risk.
AWS Lambda Command Injection
Explore how an attack can be performed using a command injection vulnerability in AWS' Lambda Functions, and the steps you can take to prevent it.
Technologies Insuring the Uninsurable
SafeInside Insurance VP, Steven Schwartz, hosts an esteemed panel exploring the technology that can underwrite the uninsurable.
Underwriting in a World with Growing Cyber Threats
How do you underwrite Cyber Risk — the most complex and dynamic risk in the world? Steven Schwartz, VP SafeInside Insurance, has the answer.
PwnKit: Local Privilege Escalation Vulnerability
PwnKit: Discover the exploitation techniques used by attackers for this vulnerability, and how your team can mitigate the risk.
Factsheet: Make FAIR Practical for Your Business
Your business can leverage the FAIR framework more practically. Learn how to implement a Cyber Risk Quantification solution that's suitable for you, using SAFE.
How CISOs can Answer Gartner’s Top 5 Board Questions using Cyber Risk Quantification
Cyber risk has tangible financial and operational consequences for a business. Learn how to tackle Gartner’s top 5 cyber risk questions using Risk Quantification.
CRQ 101: What is Cyber Risk Quantification?
Discover how CRQ enables you to assess, prioritize, and manage cyber risk in real-time, and contextually communicate cybersecurity risk to your Board.
AZ Asia-Pacific and Safe Security join forces to offer Cyber Risk Quantification & Management Solution across ASEAN
Businesses across ASEAN will be able to transform their Cyber Risk Management efforts and evaluate the financial impact of any detected cyber threat.
Safe Security's Vice President of Insurance and Underwriting, Steven Schwartz, to Speak at 2022 Insurtech Insights Americas
Steven Schwartz is a recognized expert in cyber insurance and underwriting. Meet him at Insurtech Insights Americas, May 2022.
CRQ Calculator: Find Out your Industry's Cyber Exposure with Safe's Zero Cost Calculator
Ever wondered how exposed your industry is to cyber risk, or how it compares to others? Use our FREE Cyber Risk calculator to find out.
Exploitation of Spring4shell in the Wild
Spring4Shell is a vulnerability of critical severity affecting Java’s most popular framework, Spring.
Safe Security Strengthens Advisory Board, welcomes David Reilly, veteran financial services executive
Saket Modi, CEO: With David, we are a step closer to realizing our mission of making SAFE the de-facto standard for measuring and mitigating cyber risk.
Third-Party Risk: Why Cybersecurity Risk Ratings Are Not Enough
Discover how to successfully upgrade your third party risk management (TPRM) with outside-in plus inside-out scans, using AI-powered Cyber Risk Quantification.
Infographic: A False Sense of Security - Why Risk Ratings are Not Enough
Learn how to go beyond security rating services and gain real-time visibility to your third party cybersecurity risk using cyber risk quantification and SAFE.
Protecting Critical Infrastructure with Cyber Risk Quantification
Cyber risk management in critical infrastructure is broken. But what's the solution? Learn from the experience of industry veteran, Michael Johnson.
Okta Breach and Third Party Cybersecurity: Addressing TPRM with Risk Quantification
The Okta Breach serves a reminder of how critical it is to mitigate third party risk. So what's the solution? Explore the power of Cyber Risk Quantification.
SEC Cyber Risk Proposal: A Call for Cyber Risk Quantification?
The SEC suggests landmark changes to cyber risk management within public companies. Read this snapshot for the full 101 on what it means and how to respond.
Protecting Critical Infrastructure During Times of Conflict
The Russia-Ukraine conflict highlights the need for a proactive approach to cybersecurity risk if we are to keep critical infrastructure safe.
Safe Security welcomes cybersecurity veteran Michael Johnson to its Board of Directors
Michael Johnson, former US government and commercial industry CIO and CISO, joins Safe Security to standardize quantitative cyber risk management.
How to Prioritize and Allocate Your Cybersecurity Resources using SAFE
Cybersecurity teams have finite time, budget, and resources. Find out how to identify where you'll get the most return and prevent successful attacks.
How to Protect Your Crown Jewels: Quantifying Risk Within Critical Infrastructure
In this blog, we will explore how security teams can reduce the attack surface of critical infrastructure with a quantified solution across the enterprise.
How to Measure, Manage, and Mitigate Third Party Risk in Real-Time
Download and read this whitepaper to learn how to smartly manage third-party risks in real-time using SAFE. Learn more here.
Safe Security and Infosys Announce Strategic Collaboration
Safe Security and Infosys announce global and strategic collaboration to bring a 360-degree cyber risk management solution to the market.
Third-Party Risk Management is Ready For Breach-Likelihood Scores
Traditional third-party risk management is inefficient. Read this blog to understand why third-party risk management needs a modern approach.
6 Top Considerations for CISOs Investing in Cybersecurity
Read this blog to better understand what are the 6 main considerations for CISO's investing in cybersecurity and how a breach-likelihood score can help.
WordPress LiteSpeed Cache Vulnerability [CVE-2020-29172]
Learn more about this cross-site scripting attack affecting Wordpress, plus how you can replicate an XSS attack in a controlled environment and how to mitigate the risk.
Microsoft MSHTML Remote Code Execution [CVE-2021-40444]
Find out more about RCE attacks on MSHTML, how they work, and how you can prevent them.
PrintNightmare Vulnerability [CVE 2021-1675 & CVE-2021-34527]
This research article takes a look at a Printer vulnerability, PrintNightmare, a local privilege escalation vulnerability found in the Windows Print spooler function.
Vulnerabilities in Apache HTTP Server [CVE 2021-42013]
Explore recent Apache HTTP Server vulnerabilities that lead to attacks such as Path Traversal and Remote Code Execution.
Healthcare Sector Needs a Measurable Cyber Risk Parameter: Breach-likelihood
Download and read this whitepaper to better understand why the healthcare sector requires a quantified real-time cyber risk parameter like SAFE Score.
How Breach-Likelihood Can Help Your Organization in the Financial Services Sector
Download and read this whitepaper to better understand how cyber breach-likelihood can help your organization in the BFSI sector. Learn more here.
Cybersecurity and Financial Services: Thinking outside the Assessment checkbox
Explore the role of cybersecurity in the BFSI sector and how you can accurately quantify cyber risks to determine the likelihood of a cyber breach.
How Likely is Your Hospital to be Hacked?
Learn how likely is your hospital to be hacked or cyber breached and why you can trust the SAFE score to assess your cyber risk posture.
Your Single Biggest Risk in Cyber
Safe Security CEO Saket Modi chats with renowned cyber risk expert, Douglas Hubbard, about the single biggest threat to cyber: Not measuring cybersecurity risk.
The Future of Cyber Insurance
Find out how Cyber Risk Quantification gives your business crucial cybersecurity risk insight to negotiate fair cyber insurance premiums.
OWASP Top 10 Web Application Security Threats and Standards
Gain an in-depth understanding of critical web application vulnerabilities mapped in the OWASP Top 10, OWASP ASVS, WASC, and SANS CWE 25.
Polkit Authentication Bypass Local Privesc Vulnerability
Understand how the authentication bypass vulnerability found in polkit is exploited, and how your team can prevent attackers from leveraging it against you.
CurveBall - CryptoAPI Spoofing Vulnerability [CVE-2020-0601]
This paper aims to explain CVE-2020-0601, aka CurveBall, a web browser vulnerability in which the signature of certificates is not correctly verified.
HiveNightmare aka Serious SAM [CVE 2021-36934]
HiveNightmare / SeriousSAM is a zero-day privilege escalation that takes advantage of overly permissive access control lists. Find out to fix this.
Cybergym is a Safe Security internal CTF for the Lucideus hackers to learn and practice something new via different challenges. Check it out now.
unSafe Bank is a core virtual banking suite designed for developers and security analysts to improve their vulnerability assessment and penetration testing skills.
Blind SSRF with Shellshock Exploitation
Learn about the different types of blind Server Side Request Forgery (SSRF) attacks and how you can manage them.
Android 11 PIP Vulnerability
A deep-dive into the Picture-in-Picture (PIP) vulnerability affecting devices running Android 11, plus steps to identify and mitigate it.
Detecting and Protecting your Smartphone from Pegasus Spyware
Pegasus spyware has been deployed as a surveillance tactic against global leaders and activists. Explore it in more detail and how you can protect against it.
BT invests in unique Silicon Valley technology to measure and fight cyber risk
British Telecom has announced a multi-million pound investment in Safe Security, an industry-leading cyber risk quantification firm. Read more here.
Safe Security is not connected to the entity operating www.lucideus.com
This press release is to clarify that Safe Security Inc is in no manner connected to the entity operating lucideus.com or its business. Read more here.
XML External Entity Injection via MP3 File Upload on WordPress
Learn more about this XXE attack affecting Wordpress instances. Find out how it's used to access your sensitive data and how to manage the risk.
Spoofing Downloaded Filename’s Extension in Chromium
We take a closer look at spoofing within Chromium browsers and the steps you can take to reduce the risk of CVE 2021-21123.
Android Vulnerability in ES File Explorer
Explore manual exploitation of ES File explorer – a vulnerability allowing attackers on the same network to execute apps and access sensitive data.
CMS Made Simple Exploit Explained [CVE-2020-10682]
This article explains how the MySQL service exploitation works, its scope of impact, and mitigation recommendations to prevent such attacks.
Chrome Browser FileReader (UAF) Vulnerability
Gain insight into how the Chrome Browser FileReader (UAF) Vulnerability works and learn techniques to prevent it.
Heap-Based Overflow Vulnerability in Sudo [CVE 2021-3156]
This paper explores Unix-like systems which are vulnerable to heap-based buffer overflow attacks, aka the Sudo vulnerability.
Ubuntu OverlayFS Local Privesc Vulnerability
Read this blogpost to learn the lab setup required to demonstrate the OverlayFS exploitation, plus mitigation strategies for various versions of Ubunto.
Windows Win32k Elevation of Privilege Vulnerability
This security article explains where the Win32k Elevation bug exists, why it is important, and how you can plan its mitigation.
Panel discussion on Third Party Risk Management
Safe CEO Saket Modi discusses the need for quantifying supply chain cyber risk, and how inside-out scans using CRQM solutions can improve risk visibility.
How do you Measure & Mitigate Cyber Risk?
In this whitepaper, you will learn how to measure and mitigate cyber risk for your business to keep hackers at bay. Read this insightful whitepaper now.
Keep Employees at the Core of your cybersecurity
Re-engineer the cyber consciousness of your employees so that they don't fall prey to online scams and hacking attacks. Read the whitepaper now.
How Close is your Organization to Being Breached?
Read this whitepaper to understand how close is your organization to being breached. Quantify the likelihood of a cyber breach with SAFE now.
A Silver Lining to Cloud Security: Quantification of Digital Business Risk?
In this whitepaper, you will learn what considerations should be made before and after migrating the cloud. Learn more here.
A Beginners Guide to Linux Firewall
A guide to securing your network using Linux firewalls. Learn how to configure UFWs and protect your systems from a variety of attacks.
Heartbleed Attack - What it is and How Does it Work?
All you need to know about the Heartbleed attack – from what it is, to how it works, to the steps you can take to manage the risk.
Injection Attacks Analysis: SQL Injection, Host Header, and more
Learn everything you need to know about injection attacks, such as Host Header Injections, SQL Injections, SMTP Injections, and more.
Introduction to Insecure Deserialization
OWASP Top Ten - A Guide to Insecure Deserialization: What it is, why it's important, how to identify it, and how to mitigate it to protect your website.
A Hands-on Approach to Linux Privilege Escalation
Discover the variety of techniques that pentesters can use to achieve privilege escalation and gain access to higher roles in Linux-based systems.
Deep Insight into Social Engineering
Explore the impact of social engineering and how cyber risk quantification can help you manage the risk from your workforce.
Understanding and Exploiting Zerologon
This research paper explains the detailed working of the Zerologon vulnerability. Learn about Netlogon and the different vulnerabilities in this protocol.
SMBGhost CVE 2020-0796
A write-up on the SMBGhost vulnerability found in Windows 10 systems, including how it works, where to find it, and mitigations to help prevent exploitation.
URL Exploiting XXE to SSRF
An introduction to XML and how XXE and SSRF attacks are executed. Learn how to identify the vulnerability and how to mitigate.
Apache Ghostcat CVE 2020-1938
Gain insight into Tomcat AJP connectors. Understand how the Ghostcat vulnerability can be detected and managed in your environment.
Douglas W. Hubbard Joins Safe Security’s Advisory Board
Douglas W Hubbard, founder of Hubbard Decision Research (HDR) and global leader in data science, is joining our advisory board. Learn more about him.
Fast-Growing Cybersecurity Startup Rebrands as Safe Security and Commits to US Growth Plans
Fast-growing cybersecurity startup rebrands as Safe Security and commits to US growth plans. Read to learn more.
Lucideus Launches SAFE Me, Redefines the Way Consumers Secure and Protect Their Digital Lives
A one of its kind mobile application, SAFE Me empowers consumers to proactively defend against a growing number of cyber threats
Tech Mahindra and Lucideus Announce Strategic Collaboration to Conduct Annual Cybersecurity Assessment for Organisations Globally
Today Tech Mahindra and Lucideus announce strategic collaboration to conduct annual cybersecurity assessment for organisations globally.
Lucideus Adds John N. Stewart to its Board of Directors
Safe Security (formerly Lucideus) appoints John N. Stewarts to its Board of Directors. He has over three decades of experience and is a leader and veteran in the cybersecurity space.
Lucideus raises fresh round of 7 M US dollars, doubles valuation in 10 months
Safe Security (formerly Lucideus) a global leader in Cyber Risk Quantification space announced that it has doubled its valuation by raising a fresh round.
Lucideus Launches SAFE to Keep Customers Safe from Cyber Threats
Safe Security (formerly Lucideus) today announced the release of SAFE - an enterprise cyber risk management platform for real-time cyber risk quantification.
Lucideus Raises Strategic Investment, Strengthens Market Leadership
Safe Security (formerly Lucideus), an IT risk assessments and cybersecurity platforms provider, today announced they have closed an angel funding round.
Lucideus Receives Funding, Plans to Expand Team and Business
Safe Security (formerly Lucideus), a pioneer in cyber risk quantification announced that it has received angel funding from Amit Choudhary, Director, Motilal Oswal Private Equity.
About us:[email protected]
Safe Security Inc. is a leader in cybersecurity and digital business risk quantification management, with a mission to build a safer digital future. Safe’s cyber risk quantification and management (CRQM) platform enables organizations to manage cyber risks in real-time. Its platform automatically collects signals from inside and outside a company’s environment to give the company-specific cyber risk rating, or SAFE Score, the financial impact of a potential breach, and an action plan – including how to manage and transfer cyber risk. This enables organizations to have a common language across teams – the Board, investors, and regulators – to align with a consistent risk metric.