White Papers

Major 3rd-Party Data Breaches Of 2018

Jan 2019

3rd-party (aka supply-chain) cyber attacks were one of the main reasons for major data breaches in 2018. Here is a recap of 3rd-party data breaches that hit the news in 2018. Almost 60% of the companies experienced a data breach caused by 3rd party According to the 2018 Data Risk in the Third Party Ecosystem Study from Ponemon Institute

2018 Airlines Phishing Report

Dec 2018

As the holiday season arrives, many buy airline tickets to travel to their loved ones or to relax in a nice place. Hackers are eager to exploit this urge of people by creating websites (phishing domains) of major airlines to steal personal and payment information.

5 Enlightening Statistics About Third-Party Cyber Risk

Dec 2018

Carbon Black reports  that half of todays attacks leverage “island hopping”, a method which attackers use third-party providers to infiltrate the target company. Bomgar reports that two third of security professionals believe

Are There Any Domains Impersonating Your Company For Phishing?

Nov 2018

Phishing domains are exploited to target not only employees but also customers. Even though companies cannot be directly held responsible for customers deceived by phishing scams, it is a loss of reputation when a company does not take necessary measures.

NormShield Cyber Risk Rating

Oct 2018

There are different tools to assess cyber risk of your ecosystem that consists of your company’s third-party vendors. Why NormShield? Because, NormShield provides full and continuous visibility to your entire supply chain and you can

NormShield vs. Classical Solutions for Supply Chain Risk Management

Oct 2018

Old-school questionnaire methods to determine supply chain risk management and assess third party risk are usually ineffective and provide limited intelligence. NormShield Cyber Risk Scorecards improve management of supply chain risk management while saving time and money.

Third-Party Risk in Regulations

Aug 2018

Many companies rely on regulations created by trustworthy organizations to check their cyber security measurements. Compliance to these regulations helps companies and organizations to improve their security posture and they present themselves as “secure”. Lack of compliance may impose very high penalties and reputation loss.

2018 Guide to Select 3rd Party Cyber-Risk Assessment Tool

Jun 2018

A recent survey conducted by Ponemon Institute reveals that 56% of companies have experienced a 3rd-party breach in 2017, which is an increase of 7% compared to previous year. Another survey conducted by Deloitte in 2016 was more depressive, reporting that 87% of organizations have experienced a disruptive incident with third-parties in the last 2-3 years.

2018 3rd Party Cyber Risk Report

May 2018

Matt, CISO of a large company, comes to office on Friday. He is a very successful Chief of Information Security Office and he is very confident of capabilities of his team. They handle all vulnerabilities inside their own system, continuously scan and monitor their system, they use cutting-edge security tools such as firewalls,

Is Your Money Safer in Cryptocurrency Exchange Markets than Banks?

April 2018

Crypto coins are the new mean of investment and shopping and their exchange volume increases exponentially. There are many exchange markets handles these investments. However, the question of resiliency of these markets is on the rise with recent attacks. In 2014, one of the largest crypto coin exchange market,

2018 Cyber Security Risk Brief

April 2018

We analyzed more than 100,000 live assets from over 200 companies to find out which industries are at the head of the class, who needs to get their grades up, and the threats that everyone needs to address.

Trends and Insights from Cyber Risk Scorecard Key Data Points Includes detailed external security risk data from cyber risk scoring for: 5127 organizations across multiple industries. Over 1,000,000 active assets on the Internet, including web and network devices.

When DNS is compromised by a hacker, a user’s legitimate application request is redirected to a different network host, possibly with malicious intent…

Schedule time with one of our Information Security Specialist to chat about
your specific needs and see NormShield in action!
Fill out the form and we will get in touch with you soon.