Security News

Keycloak: Open-source identity and access management
2024-12-12 04:00

Keycloak is an open-source project for identity and access management (IAM). It provides user federation, strong authentication, user management, authorization, and more. Keycloak is based on...

Want to Grow Vulnerability Management into Exposure Management? Start Here!
2024-12-05 12:46

Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to help organizations identify and...

How AI is transforming human risk management
2024-12-02 04:30

While human error has always posed a cybersecurity risk, AI and emerging tech are playing an evolving role in Human Risk Management – uncovering new needs, challenges, and pain points. In this...

The effect of compliance requirements on vulnerability management strategies
2024-11-29 05:30

In this Help Net Security interview, Steve Carter, CEO of Nucleus Security, discusses the ongoing challenges in vulnerability management, including prioritizing vulnerabilities and addressing...

Automating endpoint management
2024-11-27 14:53

Addressing the challenges of patching and vulnerability remediation Webinar Managing endpoints efficiently has perhaps never been more important or more complex. …

Supply chain management vendor Blue Yonder succumbs to ransomware
2024-11-26 01:27

And it looks like major UK retailers that rely on it are feeling the pinch US-based supply chain SaaS vendor Blue Yonder has revealed a service disruption caused by ransomware, and its customers...

Live Webinar: Dive Deep into Crypto Agility and Certificate Management
2024-11-15 11:48

In the fast-paced digital world, trust is everything—but what happens when that trust is disrupted? Certificate revocations, though rare, can send shockwaves through your operations, impacting...

Evaluating your organization’s application risk management journey
2024-11-12 05:30

In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. Wysopal outlines the need...

Setting a security standard: From vulnerability to exposure management
2024-11-11 04:30

Vulnerability management has been the standard approach to fending off cyber threats for years. Still, it falls short by focusing on a limited number of vulnerabilities, often resolving only 1% to...

Top Vulnerability Management Tools: Reviews & Comparisons 2024
2024-11-08 08:13

There are a great many vulnerability management tools available. But which is best? Here are our top picks for a variety of use cases.