RegScale overcomes limitations in legacy GRC by bridging security, risk, and compliance through our Continuous Controls Monitoring platform. Our CCM pipelines of automation, dashboards, and AI tools deliver lower program…
Learn MoreThe Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint distributed denial-of-service (DDoS) attack…
Learn MoreOn March 13, 2024, the House of Representatives passed the Protecting Americans from Foreign Adversary Controlled Applications Act (H.R. 7521). If enacted, H.R. 7521 would make it unlawful to provide…
Learn MoreThe complex and dynamic processes involved in the development, deployment, use, and maintenance of AI technologies benefit from careful management throughout the medical product life cycle. Specifically, end-to-end management of…
Learn MoreWildfires across the U.S. and around the world are becoming more frequent, costly, and dangerous. The Department of Homeland Security Science and Technology Directorate is working with the U.S. Fire…
Learn MoreAs the authoring agencies have previously highlighted, the use of living off the land (LOTL) techniques is a hallmark of Volt Typhoon actors’ malicious cyber activity when targeting critical infrastructure.…
Learn MoreThe purpose of this publication is to provide organizations with guidance on how to use AI systems securely. The paper summarizes some important threats related to AI systems and prompts…
Learn MoreThe space sector is transitioning towards Hybrid Satellite Networks (HSN), an aggregation of independently owned and operated terminals, antennas, satellites, payloads, or other components that comprise a satellite system. The…
Learn MoreLeaders from across the globe met in Davos, Switzerland in early January to discuss economic and risk issues facing the world in 2024. The top ten risks forecast by the…
Learn MoreDisasters are resulting in unprecedented levels of destruction across the world. These shocks and disruptions affect the functioning and sustainability of agricultural production and threaten the livelihoods of millions of…
Learn MoreInsider threat and insider risk are critical issues for any company looking to do business with the federal government or stay in business and protect their bottom line. Insider risk…
Learn MoreIt is the premise of so many science fiction movies: technology surpasses human intelligence, wreaks havoc and ultimately takes over humankind. While that movie has not yet happened in real…
Learn MoreThis fact sheet describes the Suite of Tools for the Analysis of Risk (STAR), an innovative engine for forward-looking, functional risk assessment of critical infrastructure (CI) at the national scale.…
Learn MoreDiverse Risk Vectors easily complicate the management of global material risk and opportunities. This white paper untangles this complex and risky world. The art of Risk Governance that oversees planning,…
Learn MoreSupply Chain Risk Management (SCRM) plays a crucial role in safeguarding the integrity and security of supply chains within the Federal government. With increasing reliance on technology, there is a…
Learn More