Please turn on your JavaScript for this page to function normally.

configuration management

puzzle
Components of an effective vulnerability management process

Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data …

TPLINK admin
TP-LINK loses control of two device configuration domains

Security researcher Amitay Dan warns that tplinklogin.net, a domain through which TP-LINK router owners can configure their devices, is no longer owned by the company, and …

hole
Bridging the security automation gap

Security management has gotten out of hand, according to our recent State of Automation in Security Report. 48% of survey respondents had an application outage as a result of …

analytics IT assets
Qualys releases app for ServiceNow Configuration Management Database

Qualys announced it has received certification of its application with ServiceNow. The Qualys App for ServiceNow CMDB is an application that synchronizes Qualys IT asset …

Don't miss

Cybersecurity news