top of page
Oct 21, 20243 min read
Indictment of Sudanese Nationals: Unveiling the Anonymous Sudan Cyberattacks on Critical Infrastructure
Executive Summary In a significant development in the fight against cybercrime, two Sudanese nationals, Ahmed Salah Yousif Omer and Alaa...
Sep 29, 20244 min read
Cyber Threats in Maritime Ports: Safeguarding the Global Supply Chain from Emerging Risks
Background The maritime ecosystem is under a growing cyber security threat, driven by financial incentives of opportunistic (less capable...
Aug 27, 20243 min read
Rescana Announces Strategic Collaboration with Cybersecurity Leader Wiz and Aspiration Japan to Revolutionize Cloud Security in Japan
Tokyo, Japan – August 27, 2024 – Rescana, a pioneering AI Continuous Threat Exposure Management (CTEM) company announced today a...
Aug 7, 20247 min read
CTEM 101: Understanding Continuous Threat Exposure Management
Understanding Continuous Threat Exposure Management (CTEM) In the ever-evolving digital landscape, safeguarding your organization from...
May 19, 20244 min read
Embracing the Digital Supply Chain
The most significant challenges posed by the digital supply chain is the exponential growth of shadow IT.
May 1, 20243 min read
Type Your Password One More Time
Establishing regular and repeatable security cycles as part of your Continuous Threat Exposure Management (CTEM) program is essential for...
Apr 7, 20243 min read
Digital Identity Safety
Your digital identity includes many pieces of information and attributes that uniquely represent you.
Dec 21, 20236 min read
Third party risk management - you don't know what you don't know.
Cyber attacks are never one and the same - criminals constantly leverage new strategies in their efforts to exploit digital...
Nov 19, 20231 min read
International Fraud Awareness Week
Download our Key Strategies Guide for fighting against fraud. * International Fraud Awareness Week Nov- 12-18
Nov 9, 20233 min read
Navigating the New Norm: Business-Led IT in the Modern Enterprise
In the dynamic landscape of enterprise technology, the emergence of business-led IT initiatives is a testament to the need for...
Nov 1, 20236 min read
Vendor Risk Assessment - Connecting the Dots
A new dimension of cybersecurity - correlating between business needs, cybersecurity tools, third-party vendors, and potential risks....
Oct 3, 20236 min read
A Crucial Shield Against Sophisticated Cyber Threats
The business ecosystems are a complex web of intricate digital interconnection. This complexity holds excellent opportunities but also...
Jun 19, 20235 min read
Unmasking Business Email Compromise: Understanding, Identification, and Prevention
BEC. One of the most insidious threats in the modern digital landscape, causing billions of dollars losses worldwide.
May 11, 20233 min read
The Dark Side of ChatGPT and Implications for Supply Chain Security
Introduction: While AI-powered language models like ChatGPT have revolutionized various applications, they also inadvertently empower...
Apr 19, 20233 min read
Together we stand
Introduction: In an increasingly interconnected business landscape, organizations rely on a multitude of third-party vendors and partners...
Mar 23, 20233 min read
Enhancing SOAR Platforms with Machine Learning for Comprehensive Third-Party Risk Management
Integrating a layer of Machine Learning algorithms into SOAR platforms can boost its ability to manage risks associated with third-party.
Feb 27, 20231 min read
Suppliers Cybersecurity Ranking
Managing your supply chain helps you essence your organization's cybersecurity posture. To do that, we created this simple table to...
Feb 6, 20237 min read
Remote Work and the Implications of Third-Party Risk Management
Remote Work and its Implications
Jan 16, 20234 min read
Mind the Gap: Yearly Assessments for Third-Party, Supply-Chain Vendors
Yearly assessments of vendor security practices can help an organization identify potential security gaps and vulnerabilities in its network
Dec 22, 20226 min read
Mapping Your Third-party Providers Based on These Simple Rules
Without a reliable third-party risk management plan, it would be impossible for you
to add vendors to your supply chain without exposing you
bottom of page