Rivial’s Cybersecurity blog

The Savvy CISO

Cybersecurity management insights, tips, and trends for security leaders, CISOs, vCISOs, and MSSPs who want to work smarter, not harder.

Key Components of an AI Security Policy - Rivial

4 min read

Key Components of an AI Security Policy

Why should you care about AI? Well because AI is either already influencing your day-to-day operations or will be very soon. Whether you are a business owner, operations manager, or someone responsible for ground-floor tasks, AI is poised to impact...

Read More

8 min read

12 Best Cybersecurity Companies in 2024

For security leaders tasked with protecting businesses' most sensitive data, selecting the right cybersecurity company is imperative. These...

Read More
How to Build and Test an Incident Response Plan

5 min read

How to Build and Test an Incident Response Plan (IRP)

Whether you're a small startup or a major financial institution, having a well-crafted incident response (IR) plan is crucial for effectively...

Read More
Exceeding NCUA and FDIC Examiner Expectations

3 min read

Exceeding NCUA & FDIC Examiner Expectations

In this blog, we’ll explore strategies to help banks and credit unions meet and exceed examiner expectations. Given the rigorous standards of the...

Read More

6 min read

10 Best Vulnerability Management Software in 2024

Safeguarding sensitive data against cyber threats is paramount. IT and cybersecurity professionals, especially those working in critical sectors like...

Read More
Preparing for NCUA and FDIC AI Requirements

2 min read

Preparing for NCUA and FDIC AI Requirements

We've noticed a rising trend among our clients, examiners are bringing up the topic of AI, inquiring whether AI is incorporated into their systems,...

Read More
UPDATES TO FDIC'S InTREx

3 min read

UPDATES TO FDIC'S InTREx

In an effort to tackle emerging cybersecurity threats, the FDIC recently updated their Information Technology Risk Examination (InTREx) procedures,...

Read More
defend against ransomware attacks

5 min read

Incident Response Playbook: Ransomware

Considered one of the most detrimental threats to businesses, government entities, and individuals, ransomware attacks have escalated significantly...

Read More
BEC Attacks

3 min read

Incident Response Playbook: Business Email Compromise (BEC)

Flying under the radar for years, BEC attacks have been slowly climbing the ranks as one of the most popular tactics amongst cybercriminals to...

Read More