Please turn on your JavaScript for this page to function normally.

vulnerability management

vulnerability
Vulnerability management is facing three core problems: Here’s how to solve them

The COVID-19 pandemic has placed enormous stress on information security professionals. A threat landscape that was already growing more complex by the minute now presents an …

backup
Dealing with security vulnerabilities on data center servers requires more skilled staff

There is a lot of attention being paid to continuously updating servers to patch security vulnerabilities on Linux servers running in data centers – a basic step …

ransomware
Best practices for IT teams to prevent ransomware attacks

According to Check Point research, the number of organizations affected by ransomware has been growing at 9% monthly since the start of the year. From WannaCry, Petya, and …

Windows Defender
Microsoft Defender for Endpoint now detects jailbroken iOS devices

Microsoft has announced new and improved capabilities for enterprise security teams that use Microsoft Defender for Endpoint on Android and iOS and Microsoft threat and …

tunnel light
Threat intelligence: The biggest blind spot for CISOs

More than 90 percent of CISOs rely on outdated, report-based threat intelligence that is often too old to inform decisions, according to Cybersixgill. The survey also found …

code
Risk-based vulnerability management has produced demonstrable results

Several years ago, risk-based cybersecurity was a largely untested and hotly debated topic. But the tests have since been administered and the debate largely settled: …

identity theft
People are the weakest link in data breaches, but can they be held accountable?

In the people-process-technology triad, human error is the top reason for breaches, accounting for 70% of successful attacks, a Cyberinc survey reveals. The next biggest cause …

patch
March 2021 Patch Tuesday forecast: Off to an early start

Microsoft got an early start on Patch Tuesday, releasing a series of out-of-band security updates this week to address four zero-day vulnerabilities in Exchange Server. …

Hand
57% of vulnerabilities in 2020 were classified as critical or high severity

NIST logged more than 18,000 vulnerabilities in 2020, over 10,000 of which were critical or high severity – an all-time high. Redscan’s analysis looks beyond severity scores, …

cloud
Vulnerability management isn’t working for cloud security: Here’s how to do it right

Three things in life are seemingly guaranteed: death, taxes and high-profile cloud security breaches. But there is no reason why public cloud or hybrid cloud breaches must …

Door
Transitioning from vulnerability management to vulnerability remediation

Like many people, I’m glad 2020 is almost over. I am, however, excited about 2021. Here are three trends I believe will impact how well (or not) companies will be able to …

bomb
Vulnerable TCP/IP stacks open millions of IoT and OT devices to attack

Forescout researchers have discovered 33 vulnerabilities affecting four open source TCP/IP (communications) stacks used in millions of connected devices worldwide. …

Don't miss

Cybersecurity news