Diligent

Diligent Boards integrates with Microsoft Teams to improve collaboration within board meetings
Diligent announces the integration of Diligent Boards with Microsoft Teams to drive collaborative and secure board meetings. Customers can now use Diligent’s board governance …
Diligent launches Cyber Risk Scorecard powered by SecurityScorecard
Diligent announced the launch of its new Cyber Risk Scorecard powered by SecurityScorecard, the global leader in cybersecurity ratings. Diligent’s Cyber Risk Scorecard equips …
Diligent unveils Secure File Sharing and Meeting Workflow applications
In its next major extension to support modern governance, Diligent announced the launch of Secure File Sharing and Secure Meeting Workflow applications, as part of the …

The security concerns of free email service provider use
Thanks to modern collaboration tools, today’s workforce can be more secure, efficient and powerful than ever. However, leading organizations recognize that security threats …

State of security: Human error and remembering the essentials
It seems that in a sea of complex digital ploys, companies are trying so hard to guard against the next big threat that they have forgotten the basics. From years of extensive …

Your board and cyber risk: Reimagining security protocols from the top down
As scrutiny of well-known financial services firms’ security practices continues to make news, the SEC has chosen to turn its attention to risks facing a certain subset of the …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility