Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

6/22/2021
02:00 PM
Dark Reading
Dark Reading
Products and Releases
100%
0%

MDR Provider Pondurance Acquires MyCyberScorecard

INDIANAPOLIS – June 22, 2021: Pondurance, a leader in Managed Detection and Response (MDR) services, today announced the acquisition of Rockwall, Texas-based advisory and assessment services provider Bearing Cybersecurity. Under this agreement, Pondurance will integrate Bearing Cybersecurity’s flagship cloud-based platform, MyCyberScorecard, into its portfolio of advisory and managed services solutions. MyCyberScorecard analyzes and visualizes an organization’s cyber exposure to make it easy to identify and prioritize the most significant gaps while developing a plan for cyber resilience.

Pondurance customers can now access this dynamic SaaS solution to have a more streamlined and efficient cybersecurity assessment process that aligns with both internal and external standards and compliance requirements. The platform’s assessment capabilities deliver a health score (MyCyberScore) that highlights potential corporate cybersecurity gaps and provides important remediation recommendations.

Additional customer benefits include:

  • Accelerated mitigation of cybersecurity gaps and greater cyber resilience    
  • Compliance with industry and regulatory standards including NIST 800-53, NIST CSF, CIS CSC, CMMC, PCI, HIPAA, and NYDFS 500      
  • Insight into current cybersecurity posture via a MyCyberScore
  • Graphics showing cyber gaps with Dashboards and Heatmaps
  • Confirmation that third-party and supply chain vendors are conforming to security standards

“One of many issues in the industry is the disconnect between cyber risk and cyber operations,      especially when security policies and controls should be aligned to drive security operations but are often not,” said Doug Howard, CEO of Pondurance. “Joining these components and operationally aligning them to reduce risk by understanding your largest cyber gaps is critical. The MyCyberScorecard is a foundational element for Pondurance’s vision to help customers close these gaps.”

Traditionally, organizations had to rely on the organized sharing of information from disparate resources. MyCyberScorecard simplifies that process by collecting information into a single portal that provides a point-in-time integrated assessment of security operations to determine potential gaps and compliance challenges. With MyCyberScorecard, Pondurance customers will receive intelligent cyber health scores that provide the insight necessary to more effectively manage risk on an ongoing basis. With this solution, customers can be confident they are on the right path while having instant feedback on how policy changes could affect security. 

For additional details about this acquisition and MyCyberScorecard please visit: www.pondurance.com

Follow Pondurance:

LinkedIn: https://www.linkedin.com/company/pondurance/ 

Twitter: https://twitter.com/pondurance 

Facebook: https://www.facebook.com/pondurance/ 

About Pondurance

Headquartered in Indianapolis, Indiana, Pondurance delivers world-class managed detection and response services to industries facing today’s most pressing and dynamic cybersecurity challenges including ransomware, complex compliance requirements, and digital transformation accelerated by a distributed workforce. By combining our advanced platform with our experienced team of analysts, we continuously hunt, investigate, validate, and contain threats so your own team can focus on what matters most.

Pondurance experts include seasoned security operations analysts, digital forensics and incident response professionals and compliance and security strategists who provide always-on services to customers seeking broader visibility, faster response and containment, and more unified risk management for their organizations. Visit www.pondurance.com for more information.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35477
PUBLISHED: 2021-08-02
In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled valu...
CVE-2017-18113
PUBLISHED: 2021-08-02
The DefaultOSWorkflowConfigurator class in Jira Server and Jira Data Center before version 8.18.1 allows remote attackers who can trick a system administrator to import their malicious workflow to execute arbitrary code via a Remote Code Execution (RCE) vulnerability. The vulnerability allowed for v...
CVE-2021-32066
PUBLISHED: 2021-08-01
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the c...
CVE-2021-37759
PUBLISHED: 2021-07-31
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2021-37760
PUBLISHED: 2021-07-31
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).