Reducing Third-Party Risk with Continuous Monitoring

According to a recent study by SecureLink and Ponemon Institute, 51% of organizations have experienced a data breach caused by a third-party. Despite the growing risk third parties pose however, many companies are still not making securing these relationships a priority. The key to effectively mitigating your third-party risk is making it a continuous process,…

Read More

RH-ISAC Community Responds to Log4j Vulnerability

On Thursday, December 9, Apache published a zero-day vulnerability (CVE-2021-44228). Known as “Log4Shell”, this vulnerability is a critical remote code execution vulnerability in Apache’s Log4j software library, which is of extreme concern to the security community due to its widespread usage and potential for exploitation. This flaw impacts Apache Log4J, versions 2.0 to 2.14.1, a…

Read More

Member Spotlight: Tim Karns

This month’s member spotlight is someone new to RH-ISAC and new to the cybersecurity field, but he has hit the ground running, quickly becoming an active participant on our sharing channels. Today we’re featuring Tim Karns, junior security analyst at Masonite, one of the leading manufacturers of interior and exterior doors for residential and architectural…

Read More