vulnerability assessment
![NIST NVD](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/03121316/nist_nvd-1500-400x200.webp)
NIST says NVD will be back on track by September 2024
The National Institute of Standards and Technology (NIST) has awarded a contract for an unnamed company/organization to help them process incoming Common Vulnerabilities and …
![CVE](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23122922/cve-1400-400x200.jpg)
CISA starts CVE “vulnrichment” program
The US Cybersecurity and Infrastructure Agency (CISA) has announced the creation of “Vulnrichment,” a new project that aims to fill the CVE enrichment gap created …
![free vulnerability scanners](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/24110556/free_vulnerability_scanners-1400-400x200.jpg)
5 free vulnerability scanners you should check out
Vulnerability scanners delve into systems to uncover security gaps. The primary mission? To fortify organizations against breaches and shield sensitive data from exposure. …
![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/13161306/authentication-biometrics-400x200.jpg)
Enterprises persist with outdated authentication strategies
Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface …
![TSA](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/07101347/tsa-400x200.jpg)
A closer look at the new TSA oil and gas pipeline regulations
The TSA has announced updates to its Security Directive (SD) to strengthen the operational resilience of oil and natural gas pipeline owners and operators against …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/18183052/numbers-box-400x200.jpg)
SCARF cipher sets new standards in protecting sensitive data
A group of international researchers has achieved a breakthrough in computer security by developing a new and efficient cipher for cache randomization. The cipher, designed by …
![Travis Smith](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/11104056/travis_smith-2-qualts-01-400x200.jpg)
Data-backed insights for future-proof cybersecurity strategies
The Qualys Threat Research Unit (TRU) has been hard at work detecting vulnerabilities worldwide, and its latest report is set to shake up the industry. In this Help Net …
![vulnerabilities](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/27123127/vulnerabilities-way-400x200.jpg)
What you need before the next vulnerability hits
Cyberattacks tend to come from two angles: criminals take advantage of employees with privileged access or of security weaknesses in your hardware/software infrastructure. …
![CISA](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/02104140/cisa-logo-hns-400x200.jpg)
SSVC: Prioritization of vulnerability remediation according to CISA
Given that 2021 was a record year for new vulnerabilities published and threat actors became better at weaponizing vulnerabilities, timely and well-judged vulnerability …
![vulnerability assessment tools](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/29174027/vulnerability_assessment_tools-400x200.jpg)
5 open-source vulnerability assessment tools to try out
A vulnerability assessment is a methodical examination of network infrastructure, computer systems, and software with the goal of identifying and addressing known security …
![Intruder.io](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/10121258/intruder-io-400x200.jpg)
Mind the gap: How to ensure your vulnerability detection methods are up to scratch
With global cyber crime costs expected to surge, it comes as little surprise that the risk of attack is companies’ biggest concern globally. To help businesses uncover and fix …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/19165017/lock-blue-400x200.jpg)
The security gaps that can be exposed by cybersecurity asset management
Cybersecurity asset management does not come with the excitement following the metaverse, blockchain, or smokescreen detection technologies, but it is essential for the …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD