Security Experts:

Connect with us

Hi, what are you looking for?


Risk Management

NSS Labs Launches Enterprise Cyber Risk Management Solution

Security research firm NSS Labs has introduced a new SaaS offering designed to help organizations with managing their cyber risk.

Security research firm NSS Labs has introduced a new SaaS offering designed to help organizations with managing their cyber risk.

According to the company, the NSS Cyber Resiliency Center (CRC) enables enterprises to identify threats targeting their systems, evaluate their security posture, and create incident response plans. The NSS CRC includes three services: NSS Advanced Warning System, NSS InSight and NSS Research & Testing.

The NSS Advanced Warning System provides real-time alerts on the threats that target specific applications used by the organizations, and are capable of bypassing existing security controls. The alert system is designed to help enterprises with identifying the attacks that pose the greatest risk, NSS said.

The Advanced Warning System is powered by threat and security performance data obtained through testing and BaitNET, a proprietary system that collects, correlates and validates both known and unknown pieces of malware from all over the world.

NSS InSight can help executives when it comes to making decisions about security-related spending and priorities. The service enables organizations to simulate various attack scenarios and determine which security solutions and desktop applications suit their needs best, depending on various factors such as attack surface, risk tolerance and budgets, the company said.

The research and testing service provides detailed information on leading security products, including data from independent tests, and in-depth vendor, product, and market research.

According to Vikram Phatak, CEO of NSS Labs, the Cyber Resiliency Center provides enterprises with two key pieces of information: which systems and applications are being targeted by an adversary, and which of those attacks can bypass a company’s current security setup. 

 “Knowing the answers to those questions empowers an organization to plan and respond,” Phatak said. “Proactively understanding the capabilities of the adversary, understanding how breaches occur, and having a strong cyber resiliency program enables organizations to manage cyber risk in a way that has never before been possible.”


Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Risk Management

A threat-based approach to security often focuses on a checklist to meet industry requirements but overlooked the key component of security: reducing risk.

Risk Management

CISA has published a report detailing the cybersecurity risks to the K-12 education system and recommendations on how to secure it.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


More than 4,000 internet-accessible Pulse Connect Secure hosts are impacted by at least one known vulnerability, attack surface management firm Censys warns.

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem