Compromised Credentials Monitoring: The Flashpoint Advantage

Flashpoint Compromised Credentials Monitoring (CCM) allows users to monitor exposure of compromised credentials for their employee and customer email addresses to take action after breaches to mitigate risk of account takeover (ATO). First to Access Fresh Breach Data: Ability to…

Why Does Asset Management Matter for Cybersecurity?

The line between IT and Security is blurring. What was once a simple delineation between keeping information safe and providing the tools necessary to get work done is no longer clear. This white paper explores why asset management — once…

Delivering Government Data Context: Security and Governance in Support of Your Agency Mission

In an increasingly hybrid technology ecosystem, government agencies find it difficult to operationalize their vast data holdings. The information is there in abundance, but leaders still struggle to apply consistent security, governance, and intelligence across their valuable data sets. The…

NETSCOUT Threat Intelligence Report

Nation-state groups proliferate globally while cybercriminals seem one step ahead of the game, targeting not only enterprises and service providers, but also their customers. But that does not mean that your organization cannot dramatically improve its security and risk posture…

The NIST Risk Management Framework: Problems and recommendations

Cyber security assessment initiatives and frameworks abound in the US government, but their effectiveness is inconsistent. The most important law from which these frameworks and assessments arose is the Federal Information Systems Management Act (FISMA), passed in 2002, and updated…