Security News

Relying on CVSS alone is risky for vulnerability management
2023-07-31 04:00

A vulnerability management strategy that relies solely on CVSS for vulnerability prioritization is proving to be insufficient at best, according to Rezilion. Relying solely on a CVSS severity score to assess the risk of individual vulnerabilities was shown to be equivalent to randomly selecting vulnerabilities for remediation.

These 6 Questions Will Help You Choose the Best Attack Surface Management Platform
2023-07-17 10:56

For anyone ready to find an attack surface management vendor, review these six questions before getting started to understand the key features to look for in an ASM platform and the qualities of the vendor who supports it. Does your platform have the capability to discover the unknown? How do you prevent alert fatigue, prioritize alerts and remove false positives? Can you track attack surface changes over time? How do you plan to evolve the platform going forward? What services related to ASM do you offer? Can we demo or test run the platform?

Defend Against Insider Threats: Join this Webinar on SaaS Security Posture Management
2023-07-14 11:08

As security practices continue to evolve, one primary concern persists in the minds of security professionals-the risk of employees unintentionally or deliberately exposing vital information. While access controls, encryption, and monitoring systems are crucial for identifying and mitigating unauthorized access and suspicious activities, the increasing prevalence of cloud-based environments and the surge in SaaS application usage demand a fresh perspective on Insider Risk Management from a SaaS security standpoint.

Attack Surface Management: Identify and protect the unknown
2023-07-13 04:30

Attack Surface Management detects known, unknown, and potentially vulnerable public-facing assets and changes to your attack surface that may introduce risk. How? Through a combination of NetSPI's ASM technology platform, their global penetration testing experts, and their 20+ years of pentesting expertise.

EDM Council Survey: Management of Cloud Data Deployment is Lacking
2023-07-07 18:50

The Council's inaugural Cloud Data Management Benchmark Report, based on responses from more than 250 data professionals in more than 30 countries across the globe, found that less than half of the companies it polled trust cloud security and reliability enough to store their more crucial data there. The EDM Council benchmark study found that among the companies polled, cloud data management is still in the early stages, with respondents characterizing the status of their data management for cloud-deployed data in "Developmental" or "Defined" stages and few at the "Achieved" or "Enhanced" stages of maturity.

The Need for Risk-Based Vulnerability Management to Combat Threats
2023-07-07 14:04

As vulnerabilities continue to rise and security evolves, it is becoming increasingly apparent that conventional vulnerability management programs are inadequate for managing the expanding attack surface. As a result, many security teams are scrambling to adopt modern vulnerability management programs that are capable of identifying and thwarting contemporary vulnerability-based threats.

Close Security Gaps with Continuous Threat Exposure Management
2023-07-07 10:37

Leading analyst firm Gartner Research describes the solution: "By 2026, organizations prioritizing their security investments based on a continuous exposure management program will be 3x less likely to suffer from a breach." IT and security teams constantly face threat exposures, and they must proactively address critical security gaps in their exposed assets.

Password Management Policy
2023-07-04 16:00

This policy from TechRepublic Premium provides guidelines for the consistent and secure management of passwords for employees and system and service accounts. These guidelines include mandates on how passwords should be generated, used, stored and changed as well as instructions for handling password compromises.

Guide: Attack Surface Management (ASM)
2023-06-29 02:30

Attack surface expansion is a byproduct of doing business today, especially for enterprises that rely on the cloud. This can result in attack surface exposures, both known and unknown, giving malicious actors many pathways to gain entry to networks.

Syxsense Unveils Novel Unified Endpoint Management Strategy
2023-06-27 22:45

Syxsense now offers more IT and endpoint management functions, including mobile device management, automation, remediation and zero trust. Syxsense recently unveiled its all-encompassing suite - Syxsense Enterprise, which comes with patch and vulnerability management, MDM, zero trust, automation and orchestration capabilities, and remediation.