Security News

Beyond Asset Discovery: How Attack Surface Management Prioritizes Vulnerability Remediation
2023-06-27 11:27

Given attack surface sprawl and evolving threats, many organizations are embracing attack surface management tools to discover and address critical exposures. Asset discovery is an important capability to have, and one that's helping to drive the adoption of attack surface management tools and services.

A deep-dive demo of NetSPI’s Attack Surface Management (ASM) platform
2023-06-27 02:30

Learn how NetSPI's always-on solution allows companies to improve visibility, inventory, and understanding of known and unknown assets and exposures on their global attack surface and distill signal from noise. The discovery of assets and vulnerabilities is table stakes.

Why Now? The Rise of Attack Surface Management
2023-06-12 10:04

As it evolves into a critical component of threat and exposure management strategies, it's worth examining why attack surface management has grown to become a key category, and why it will continue to be a necessity for organizations worldwide. The attack surface includes any IT asset connected to the internet - applications, IoT devices, Kubernetes clusters, cloud platforms - that threat actors could infiltrate and exploit to perpetuate an attack.

5 Reasons Why Access Management is the Key to Securing the Modern Workplace
2023-06-09 11:17

Our desire for innovation, speed and efficiency has birthed new and complex security challenges that all in some way or another revolve around securing how we access resources. Because of this, effective access management now plays a more critical role in securing the modern workplace than ever.

High-risk vulnerabilities patched in ABB Aspect building management system
2023-06-07 09:52

Prism Infosec has identified two high-risk vulnerabilities within the Aspect Control Engine building management system developed by ABB. ABB's Aspect BMS enables users to monitor a building's performance and combines real-time integrated control, supervision, data logging, alarming, scheduling and network management functions with internet connectivity and web serving capabilities. During a recent security testing engagement on behalf of a client, researchers discovered an ABB Aspect appliance and that the BMS was misconfigured to be publicly available over the internet.

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them
2023-05-29 11:47

In this article, we'll look at another trending acronym - CTEM, which stands for Continuous Threat Exposure Management - and the often-surprising challenges that come along with seeing a CTEM program through to maturity. Continuous Threat Exposure Management is not a technology and you can't go to a vendor in hopes of finding a CTEM solution.

2023-05-23 04:30

To have a successful conclusion to the mergers and acquisitions process, identity and access management teams need time to prepare, test, and communicate with users to ensure the process goes as smoothly as possible. Unauthorized access: During a rapid transition, there is often temporary confusion regarding who has access to sensitive data.

Introducing Permit.io: Simplifying access control and policy management for developers
2023-05-18 04:00

In this Help Net Security video interview, Or Weis, Co-Founder and CEO of Permit.io, discusses an innovative approach to managing permissions and access control within applications. We will explore policy as code and how it addresses organizations' challenges in managing access control effectively.

Identifying a Patch Management Solution: Overview of Key Criteria
2023-05-17 11:54

An evaluation that begins with a focus on specific key criteria - essential attributes and functionality likely to be offered by many vendors but not all - will allow IT teams to narrow down their options as they work to identify the best solution for their organization's patch management needs. In Linux operating systems, the platform must determine whether a patch can be applied or if an existing patch must be removed before the new patch is applied, at which point the original patch can be reinstalled.

How Attack Surface Management Supports Continuous Threat Exposure Management
2023-05-11 14:05

In a different report, Gartner concluded that vulnerability management vendors are expanding their offerings to include Attack Surface Management for a suite of comprehensive offensive security solutions. EASM is distinct from similar market categories, such as cyber attack surface management or security risk rating services, but the differences are nuanced.