Exploitation of Spring4shell in the wild
Spring4Shell is a vulnerability of critical severity affecting Java’s most popular framework, Spring.
Okta Breach and Third Party Cybersecurity: Addressing TPRM with Risk Quantification
The Okta Breach serves a reminder of how critical it is to mitigate third party risk. So what's the solution? Explore the power of Cyber Risk Quantification.
SEC Cyber Risk Proposal: A Call for Cyber Risk Quantification?
The SEC suggests landmark changes to cyber risk management within public companies. Read this snapshot for the full 101 on what it means and how to respond.
Protecting Critical Infrastructure During Times of Conflict
The Russia-Ukraine conflict highlights the need for a proactive approach to cybersecurity risk if we are to keep critical infrastructure safe.
How to Prioritize and Allocate Your Cybersecurity Resources using SAFE
Cybersecurity teams have finite time, budget, and resources. Find out how to identify where you'll get the most return and prevent successful attacks.
How to protect your crown jewels: Quantifying risk within Critical Infrastructure
In this blog, we will explore how security teams can reduce the attack surface of critical infrastructure with a quantified solution across the enterprise.
Crypto is not cryptic if you know how to use it securely
Read this blog to understand how bad actors are scamming people in India and how everyone can stay protected against these modern scams.
Third-Party Risk Management is Ready For Breach-Likelihood Scores
Traditional third-party risk management is inefficient. Read this blog to understand why third-party risk management needs a modern approach.
6 Considerations for CISO’s Investing in Cybersecurity
Read this blog to better understand what are the 6 main considerations for CISO's investing in cybersecurity and how a breach-likelihood score can help.
Don’t Bypass Foundations If You Want to Build Robust Cyber Defenses
In this blog, you will learn why you should not bypass the building blocks of cybersecurity if you want to build a robust cyber defense for your organization.
Cybersecurity and the BFSI: Thinking outside of the assessment check-box
Explore the role of cybersecurity in the BFSI sector and how you can accurately quantify cyber risks to determine the likelihood of a cyber breach.
How likely is your hospital to be hacked?
Learn how likely is your hospital to be hacked or cyber breached and why you can trust the SAFE score to assess your cyber risk posture.
Douglas W. Hubbard joins Safe Security’s Advisory Board
Douglas W Hubbard, founder of Hubbard Decision Research (HDR) and global leader in data science, is joining our advisory board. Learn more about him.
SAFE Valentine's Day
In this blog, you learn about some cyber security tips that you should follow to stay secure and avoid scams during Valentine's day. Read more here.