Blog

Cybersecurity Predictions: What We Can Expect in 2024
CYE Insights | November 30, 2023

Cybersecurity Predictions: What We Can Expect in 2024

Recent Stories

How NIST and the SEC Align CISOs with the Board—and How CRQ Helps CYE Insights | October 3, 2023

How NIST and the SEC Align CISOs with the Board—and How CRQ Helps

Too Many Trees in the Cyber Forest: Optimizing SIEM Systems and Monitoring Threats CYE Insights | September 27, 2023

Too Many Trees in the Cyber Forest: Optimizing SIEM Systems and Monitoring Threats

The Alarming Cyber Risks of ChatGPT CYE Insights | September 21, 2023

The Alarming Cyber Risks of ChatGPT

The Importance of Threat Intelligence Monitoring in Cybersecurity CYE Insights | September 6, 2023

The Importance of Threat Intelligence Monitoring in Cybersecurity

Aligning with the New CISA Cybersecurity Strategic Plan CYE Insights | August 20, 2023

Aligning with the New CISA Cybersecurity Strategic Plan

Why the New NIST CSF 2.0 Transforms Cyber Risk Management CYE Insights | August 14, 2023

Why the New NIST CSF 2.0 Transforms Cyber Risk Management

What is Cyber Risk Optimization? CYE Insights | August 8, 2023

What is Cyber Risk Optimization?

6 Key Takeaways from the IBM Cost of a Data Breach Report CYE Insights | July 26, 2023

6 Key Takeaways from the IBM Cost of a Data Breach Report

6 Cybersecurity Risks Posed by Centralized Management CYE Insights | July 20, 2023

6 Cybersecurity Risks Posed by Centralized Management

Neglecting the Basics of Cybersecurity While Increasing Complexity CYE Insights | July 6, 2023

Neglecting the Basics of Cybersecurity While Increasing Complexity

FrontJacking: A New Attack That Threatens Reverse Proxy Servers CYE Insights | June 26, 2023

FrontJacking: A New Attack That Threatens Reverse Proxy Servers

Meet CYE’s Chief of Critical Cyber Operations CYE Insights | June 22, 2023

Meet CYE’s Chief of Critical Cyber Operations

What You Need to Know About the NIST Cybersecurity Framework CYE Insights | June 14, 2023

What You Need to Know About the NIST Cybersecurity Framework

Cyber Risk Quantification vs. Cyber Risk Optimization CYE Insights | May 30, 2023

Cyber Risk Quantification vs. Cyber Risk Optimization

What We Can Learn from the City of Dallas Ransomware Attack CYE Insights | May 22, 2023

What We Can Learn from the City of Dallas Ransomware Attack

How CYE Optimizes Your Cybersecurity Budget CYE Insights | May 9, 2023

How CYE Optimizes Your Cybersecurity Budget

What CISOs Can Gain from Cyber Risk Quantification CYE Insights | April 30, 2023

What CISOs Can Gain from Cyber Risk Quantification

What You Need to Know About the Anonymous Sudan Hacker Group CYE Insights | April 4, 2023

What You Need to Know About the Anonymous Sudan Hacker Group

3 Ways Hackers Successfully Breach Organizations CYE Insights | April 4, 2023

3 Ways Hackers Successfully Breach Organizations

Top 3 Considerations When Relying on Cyber Insurance CYE Insights | March 27, 2023

Top 3 Considerations When Relying on Cyber Insurance

Cyber Risk Assessment: What It Is and Why It’s Necessary CYE Insights | March 22, 2023

Cyber Risk Assessment: What It Is and Why It’s Necessary

Why SVB’s Closure Means More Security Risks for Its Customers CYE Insights | March 16, 2023

Why SVB’s Closure Means More Security Risks for Its Customers

3 Ways Red Team Services Help Protect Your Business’s Cyber Assets CYE Insights | February 27, 2023

3 Ways Red Team Services Help Protect Your Business’s Cyber Assets

Key Takeaways from Recent Airport Cybersecurity Incidents CYE Insights | February 22, 2023

Key Takeaways from Recent Airport Cybersecurity Incidents

6 Important Lessons Learned from an Incident Response CYE Insights | February 8, 2023

6 Important Lessons Learned from an Incident Response

Cyber Talks: Two Leaders Talk About Security in 2023 CYE Insights | January 31, 2023

Cyber Talks: Two Leaders Talk About Security in 2023

Why ChatGPT is an Opportunity and a Threat to Cybersecurity CYE Insights | January 25, 2023

Why ChatGPT is an Opportunity and a Threat to Cybersecurity

Meet a Red Team Services Leader at CYE CYE Insights | January 18, 2023

Meet a Red Team Services Leader at CYE

Addressing the Significant Challenges of OT Environment Security CYE Insights | January 5, 2023

Addressing the Significant Challenges of OT Environment Security

How to Perform a Cyber Risk Assessment in 2023 CYE Insights | December 20, 2022

How to Perform a Cyber Risk Assessment in 2023

Top 5 Cybersecurity Predictions for 2023 CYE Insights | December 15, 2022

Top 5 Cybersecurity Predictions for 2023

Improving Security in Your OT Environments CYE Insights | December 11, 2022

Improving Security in Your OT Environments

The Complete Guide to Cyber Risk Quantification CYE Insights | November 30, 2022

The Complete Guide to Cyber Risk Quantification

Red Team vs. Blue Team Cybersecurity: They Can Help Your Business CYE Insights | November 10, 2022

Red Team vs. Blue Team Cybersecurity: They Can Help Your Business

Meet Ira Winkler: CYE’s Newest Field CISO CYE Insights | November 3, 2022

Meet Ira Winkler: CYE’s Newest Field CISO

4 Key Strategies to Improve Your Company’s Cybersecurity CYE Insights | October 24, 2022

4 Key Strategies to Improve Your Company’s Cybersecurity

Is Apache Commons Text RCE the New Log4Shell? CYE News | October 20, 2022

Is Apache Commons Text RCE the New Log4Shell?

The Top 3 Approaches of Cyber Risk Assessment Software CYE Insights | October 12, 2022

The Top 3 Approaches of Cyber Risk Assessment Software

The Top 3 Targets of Healthcare Cybersecurity Breaches Healthcare Industry | September 21, 2022

The Top 3 Targets of Healthcare Cybersecurity Breaches

Cyber Risk Assessment Services in the Financial Industry: 5 Key Tactics CYE Insights | September 8, 2022

Cyber Risk Assessment Services in the Financial Industry: 5 Key Tactics

Traditional Cyber Risk Quantification Models Don’t Work. Here’s Why. CYE Insights | August 18, 2022

Traditional Cyber Risk Quantification Models Don’t Work. Here’s Why.

The Top Healthcare Cybersecurity Trends for Hospital CISOs Healthcare Industry | August 9, 2022

The Top Healthcare Cybersecurity Trends for Hospital CISOs

What Should a Cyber Risk Quantification Strategy Entail? CYE Strategy | July 28, 2022

What Should a Cyber Risk Quantification Strategy Entail?

Takeaways from 5 Real-World Healthcare Cybersecurity Breaches from 2022 Healthcare Industry | July 13, 2022

Takeaways from 5 Real-World Healthcare Cybersecurity Breaches from 2022

Top 5 Security Tips to Protect Social Media Profiles CYE Strategy | June 21, 2022

Top 5 Security Tips to Protect Social Media Profiles

Using Hyver’s Mitigation Planner Graph for Actionable Insights CYE Strategy | June 14, 2022

Using Hyver’s Mitigation Planner Graph for Actionable Insights

3 Security Questions Your Board Might Ask CYE Insights | June 1, 2022

3 Security Questions Your Board Might Ask

Protecting Your Business from Attacks That Exploit Human Weaknesses CYE Insights | June 1, 2022

Protecting Your Business from Attacks That Exploit Human Weaknesses

Russian Cyber Attacks: Analysis and Recommendations [Updated 22.5] CYE News | March 30, 2022

Russian Cyber Attacks: Analysis and Recommendations [Updated 22.5]

Lapsus$ Attack on OKTA – Analysis and Recommendations CYE News | March 23, 2022

Lapsus$ Attack on OKTA – Analysis and Recommendations

Cyber Terrorism is Officially a Component of Warfare CYE News | March 16, 2022

Cyber Terrorism is Officially a Component of Warfare

Yet Another Lesson on How Patience is a Virtue CYE News | March 16, 2022

Yet Another Lesson on How Patience is a Virtue

The Possible China Taiwan Effect From The Russia Ukraine War CYE News | March 16, 2022

The Possible China Taiwan Effect From The Russia Ukraine War

The Russia-Ukraine Cyber Attacks CYE Insights | March 2, 2022

The Russia-Ukraine Cyber Attacks

The Cyber Chapter of The Russian Playbook In Ukraine CYE Insights | March 1, 2022

The Cyber Chapter of The Russian Playbook In Ukraine

Application Security at Hyper-Growth Companies Events | February 22, 2022

Application Security at Hyper-Growth Companies

Log4Shell: Pragmatic Recommendations For CISOs CYE Insights | December 23, 2021

Log4Shell: Pragmatic Recommendations For CISOs

Top 3 Cyber Threats and Challenges in 2022 CYE Insights | December 12, 2021

Top 3 Cyber Threats and Challenges in 2022

10 Tips for National Cybersecurity Awareness Month CYE Insights | October 31, 2021

10 Tips for National Cybersecurity Awareness Month

The 5 Security Gaps Most Organizations Will Face CYE Insights | October 10, 2021

The 5 Security Gaps Most Organizations Will Face

Making Sense of the TSA’s Latest Cyber Regulations for LNG Facilities CYE Strategy | July 27, 2021

Making Sense of the TSA’s Latest Cyber Regulations for LNG Facilities

CYE Partners with OTORIO to Combat Rise in Industrial Ransomware Attacks Partnerships | July 20, 2021

CYE Partners with OTORIO to Combat Rise in Industrial Ransomware Attacks

Your Cybersecurity Program Needs Data, Numbers and Facts CYE Strategy | June 14, 2021

Your Cybersecurity Program Needs Data, Numbers and Facts

Your Security Metrics are Making you Less Secure CYE Insights | June 12, 2021

Your Security Metrics are Making you Less Secure

CYE Partners with ALSO to Arm SMEs with Enterprise-Level Cybersecurity Partnerships | May 26, 2021

CYE Partners with ALSO to Arm SMEs with Enterprise-Level Cybersecurity

Top 5 Cybersecurity Risks for Food Manufacturers Food Industry | May 24, 2021

Top 5 Cybersecurity Risks for Food Manufacturers

Your Scanners and WAFs are Not Going to Protect You CYE Insights | May 9, 2021

Your Scanners and WAFs are Not Going to Protect You

Board Members, Start Asking the Right Questions on Security CYE Strategy | May 1, 2021

Board Members, Start Asking the Right Questions on Security

Cybersecurity Maturity – A Game Changer in Due Diligence and M&A’s CYE Strategy | April 28, 2021

Cybersecurity Maturity – A Game Changer in Due Diligence and M&A’s

The Shocking Blind Spots Most CISOs Have in Their Networks CYE Insights | April 4, 2021

The Shocking Blind Spots Most CISOs Have in Their Networks

We Welcome Our New Advisory Board to Support Our Global Growth CYE Insights | March 11, 2021

We Welcome Our New Advisory Board to Support Our Global Growth

The Biggest Mistakes Online Gaming CISOs are Making Gaming Industry | February 23, 2021

The Biggest Mistakes Online Gaming CISOs are Making

We Secured Over $100 Million Funding Round CYE News | February 11, 2021

We Secured Over $100 Million Funding Round

Real Cybersecurity: What You Get When You Eliminate the Guesswork CYE Insights | January 19, 2021

Real Cybersecurity: What You Get When You Eliminate the Guesswork

A Glimpse into the Minds of Cyber Experts CYE Insights | January 8, 2021

A Glimpse into the Minds of Cyber Experts

Redefining Cybersecurity in the 2021 Post-Corona Paradigm CYE Insights | December 16, 2020

Redefining Cybersecurity in the 2021 Post-Corona Paradigm

How Insurers are Combating Ransomware Hackers Insurance Industry | November 25, 2020

How Insurers are Combating Ransomware Hackers

IoMT Threats: Addressing Digital Medical Device Cybersecurity Healthcare Industry | November 12, 2020

IoMT Threats: Addressing Digital Medical Device Cybersecurity

The Use of Too Many Security Solutions has Become a Security Problem CYE Insights | November 9, 2020

The Use of Too Many Security Solutions has Become a Security Problem

Protect Me from Myself: The Human Factor in IT Security CYE Insights | October 25, 2020

Protect Me from Myself: The Human Factor in IT Security

Automotive Cybersecurity: The Day After Covid-19 Automotive Industry | September 29, 2020

Automotive Cybersecurity: The Day After Covid-19

What Makes Us CYE – The Five Lights that Guide Our Way CYE Spirit | September 24, 2020

What Makes Us CYE – The Five Lights that Guide Our Way

Cybersecurity Best Practices for South African Organizations CYE Strategy | September 23, 2020

Cybersecurity Best Practices for South African Organizations

CYE Partners With Zurich Insurance Partnerships | July 28, 2020

CYE Partners With Zurich Insurance