Security News

Product showcase: The Intruder vulnerability management platform
2022-12-12 05:30

Vulnerability scanning is a fundamental component of every good cyber security strategy - but it can be challenging to get right. Intruder created a vulnerability management platform to make it simple and save time, so that every business can enjoy the same level of security as banks and governments worldwide but without the complexity.

How to secure your email via encryption, password management and more
2022-11-29 10:10

Below, you'll find four key resources you can use to take your email security to the next level. Electronic communication policy While communication tools such as email are convenient, they can also be dangerous.

The impact of inadequate SaaS management
2022-11-23 05:00

In this Help Net Security video, Uri Haramati, CEO at Torii, talks about how it's impossible for IT to take full ownership or responsibility for managing cloud apps today. Instead, SaaS management is a team sport-but not all the players know they're on a team.

Why Identity & Access Management Governance is a Core Part of Your SaaS Security
2022-11-03 10:34

Every SaaS app user and login is a potential threat; whether it's bad actors or potential disgruntled former associates, identity management and access control is crucial to prevent unwanted or mistaken entrances to the organization's data and systems. Identity and Access Management solutions administer user identities and control access to enterprise resources and applications.

Ghostwriter: Open-source project management platform for pentesters
2022-10-27 04:30

In this Help Net Security video, Christopher Maddalena, Director of Internal and Community Product at SpecterOps, showcases Ghostwriter, which helps you manage clients, projects, reports, and infrastructure in one application. The tool does not replace some of the more common or traditional project management tools, such as CRMs. Still, it does consolidate all relevant project information in a way for users to easily curate every aspect of their projects.

Asset risk management: Getting the basics right
2022-10-24 04:50

The number one thing enterprises need to do is get back to basics and focus on what builds the foundation to robust asset risk management - and that is visibility and understanding of risk. Asset risk management is paramount to an effective zero trust architecture.

Product showcase: ImmuniWeb Discovery – attack surface management with dark web monitoring
2022-10-20 04:15

The underlying concept is simple and efficient: combining Attack Surface Management with dark web monitoring to boost their synergized value, making the "1+1=3" formula possible. Importantly, every single IT asset will be mapped onto the cyber threat landscape, visualizing the ongoing phishing campaigns targeting your customers or employees, dark web announcements selling access to your compromised systems or corporate data, rogue mobile applications usurping your corporate identity, stolen credentials from your applications or third-party systems processing your data, and IoCs found on your systems.

Cybersecurity in Water Management Facilities
2022-10-20 00:00

You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.

THE TLS CERTIFICATE MANAGEMENT BEST PRACTICES CHECKLIST
2022-10-14 00:00

In the last year, 60% of organizations suffered a certificate related outage that impacted their critical business applications. These outages are now costing large corporations an average of $5,600 per minute, damaging reputation and growth rates.

The Ultimate SaaS Security Posture Management Checklist, 2023 Edition
2022-10-06 12:04

It's been a year since the release of The Ultimate SaaS Security Posture Management Checklist. SaaS apps are dynamicand ever-evolving - apps' settings need to be modified on a continuous basis from security updates and app feature enhancements to employees added or removed, and user roles and permissions set, reset, updated, etc.