vulnerability assessment
![geometry](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094019/geometry-400x200.jpg)
When is the right time to red team?
“It takes a thief to catch a thief.” Despite being hundreds of years old, this idiom holds perfectly true for that most modern of thieves, the cybercriminal. With …
![burn](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110748/burn-400x200.jpg)
How mainstream media coverage affects vulnerability management
For better or for worse, mainstream media is increasingly covering particularly dangerous, widespread or otherwise notable security vulnerabilities. The growing coverage has …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094422/magnify-inspect1-400x200.jpg)
Researchers working on tools that aim to eliminate computer bugs
It’s bad enough losing an hour’s work when your computer crashes – but in settings like healthcare and aviation, software glitches can have far more serious consequences. In …
![fingers crossed](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095347/fingers_crossed-400x200.jpg)
Should enterprises delay efforts to remediate most vulnerabilities?
Companies today appear to have the resources needed to address all of their high-risk vulnerabilities. The research demonstrates that companies are getting smarter in how they …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
66.1% of vulnerabilities published through Q3 2018 have a documented solution
There have been 16,172 vulnerabilities disclosed through October 29th, which is a 7% decrease from the high record reported last year at this time. The 16,172 vulnerabilities …
![measure](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102801/measure-400x200.jpg)
Vulnerabilities’ CVSS scores soon to be assigned by AI
The National Institute of Standards and Technology (NIST) is planning to use IBM’s Watson to evaluate how critical publicly reported computer vulnerabilities are and …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
Connected car security is improving, researchers say
The automotive industry has apparently stepped up their game when it comes to improving connected car security. According to the latest IOActive report, which was compiled …
WhiteSource unveils free open source Vulnerability Checker
WhiteSource announced the release of its Vulnerability Checker, a free tool that provides companies with immediate, real-time alerts on the 50 most critical open source …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
There’s a global divide in how organizations assess cyber risk
Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment – defined as mature or moderately mature programs that include targeted and …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD