top of page

Indictment of Sudanese Nationals: Unveiling the Anonymous Sudan Cyberattacks on Critical Infrastructure
Executive Summary In a significant development in the fight against cybercrime, two Sudanese nationals, Ahmed Salah Yousif Omer and Alaa...
Oct 21, 20243 min read

Cyber Threats in Maritime Ports: Safeguarding the Global Supply Chain from Emerging Risks
Background The maritime ecosystem is under a growing cyber security threat, driven by financial incentives of opportunistic (less capable...
Sep 29, 20244 min read


Rescana Announces Strategic Collaboration with Cybersecurity Leader Wiz and Aspiration Japan to Revolutionize Cloud Security in Japan
Tokyo, Japan – August 27, 2024 – Rescana, a pioneering AI Continuous Threat Exposure Management (CTEM) company announced today a...
Aug 27, 20243 min read


CTEM 101: Understanding Continuous Threat Exposure Management
Understanding Continuous Threat Exposure Management (CTEM) In the ever-evolving digital landscape, safeguarding your organization from...
Aug 7, 20247 min read


Embracing the Digital Supply Chain
The most significant challenges posed by the digital supply chain is the exponential growth of shadow IT.
May 19, 20244 min read


Type Your Password One More Time
Establishing regular and repeatable security cycles as part of your Continuous Threat Exposure Management (CTEM) program is essential for...
May 1, 20243 min read


Digital Identity Safety
Your digital identity includes many pieces of information and attributes that uniquely represent you.
Apr 7, 20243 min read


Third party risk management - you don't know what you don't know.
Cyber attacks are never one and the same - criminals constantly leverage new strategies in their efforts to exploit digital...
Dec 21, 20236 min read


International Fraud Awareness Week
Download our Key Strategies Guide for fighting against fraud. * International Fraud Awareness Week Nov- 12-18
Nov 19, 20231 min read


Navigating the New Norm: Business-Led IT in the Modern Enterprise
In the dynamic landscape of enterprise technology, the emergence of business-led IT initiatives is a testament to the need for...
Nov 9, 20233 min read


Vendor Risk Assessment - Connecting the Dots
A new dimension of cybersecurity - correlating between business needs, cybersecurity tools, third-party vendors, and potential risks....
Nov 1, 20236 min read


A Crucial Shield Against Sophisticated Cyber Threats
The business ecosystems are a complex web of intricate digital interconnection. This complexity holds excellent opportunities but also...
Oct 3, 20236 min read


Unmasking Business Email Compromise: Understanding, Identification, and Prevention
BEC. One of the most insidious threats in the modern digital landscape, causing billions of dollars losses worldwide.
Jun 19, 20235 min read


The Dark Side of ChatGPT and Implications for Supply Chain Security
Introduction: While AI-powered language models like ChatGPT have revolutionized various applications, they also inadvertently empower...
May 11, 20233 min read


Together we stand
Introduction: In an increasingly interconnected business landscape, organizations rely on a multitude of third-party vendors and partners...
Apr 19, 20233 min read


Enhancing SOAR Platforms with Machine Learning for Comprehensive Third-Party Risk Management
Integrating a layer of Machine Learning algorithms into SOAR platforms can boost its ability to manage risks associated with third-party.
Mar 23, 20233 min read


Suppliers Cybersecurity Ranking
Managing your supply chain helps you essence your organization's cybersecurity posture. To do that, we created this simple table to...
Feb 27, 20231 min read


Remote Work and the Implications of Third-Party Risk Management
Remote Work and its Implications
Feb 6, 20237 min read


Mind the Gap: Yearly Assessments for Third-Party, Supply-Chain Vendors
Yearly assessments of vendor security practices can help an organization identify potential security gaps and vulnerabilities in its network
Jan 16, 20234 min read


Mapping Your Third-party Providers Based on These Simple Rules
Without a reliable third-party risk management plan, it would be impossible for you
to add vendors to your supply chain without exposing you
Dec 22, 20226 min read
bottom of page