Security News

Critical Flaws Disclosed in Device42 IT Asset Management Software
2022-08-11 09:23

Cybersecurity researchers have disclosed multiple severe security vulnerabilities asset management platform Device42 that, if successfully exploited, could enable a malicious actor to seize control of affected systems. Even more concerningly, an adversary with any level of access within the host network could daisy-chain three of the flaws to bypass authentication protections and achieve remote code execution with the highest privileges.

EaseUS Partition Master: Partition management software review
2022-08-09 16:17

EaseUS Partition Master: Partition management software review We may be compensated by vendors who appear on this page through methods such as affiliate links or sponsored partnerships. The team who designed EaseUS Partition Master provide a well-designed interface to guide people through highly-technical partition management tasks.

eBook: Privileged Access Management for Dummies
2022-08-03 02:45

With so many recent high-profile breaches accomplished through the compromise of passwords on privileged accounts, it's time all cybersecurity stakeholders got educated. Where do privileged accounts reside throughout the IT environment?

SimpleRisk: Enterprise risk management simplified
2022-08-02 03:30

In this Help Net Security video, CEO/CISO Josh Sokol, showcases SimpleRisk, a fully integrated GRC platform that can be used for all of your governance, risk management, and compliance needs. If you're at Black Hat USA 2022, you can learn more about SimpleRisk.

Kubernetes security: Shift-left strategies and simplifying management
2022-07-28 12:59

Kubernetes security is essentially a collection of techniques, strategies, and technologies created to protect the Kubernetes platform and the containers it handles. Kubernetes security addresses three main concerns: the K8s API, best practices for pod container security, and the 4 C's of cloud-native security, namely container, cluster, code, and the cloud itself.

The future of attack surface management (ASM)
2022-07-28 04:30

The legacy approach to attack surface management falls short of what modern organizations require: contextual awareness. Security teams increasingly suffer from threat intelligence sensory overload while still unable to achieve the visibility they need to protect the organization, its infrastructure, and mission critical digital assets.

Why firms need to harness identity management before it spirals into an identity crisis
2022-07-25 05:00

An incomplete identity management strategy has a serious impact on the success of digital transformation, as well as increasing cyber risk exposure. Identity data plays a fundamental role in this, and achieving impactful results is all but impossible without effective identity management.

Simplifying backup and recovery management
2022-07-21 13:49

Nothing ever stays the same for long in IT. New ways to meet the changing requirements of businesses are constantly needed alongside in-house structural and policy reforms, plus the added complication of complying with new and updated regulations. For busy IT staff there isn't always the time to comprehensively strip everything back to build in the new.

Why less can be more in backup and recovery management
2022-07-14 08:40

Most IT infrastructures evolve over time as the needs of the business and its users change to meet fresh demands and comply with updated organizational policies and regulatory requirements. Because IT staff rarely have the time to orchestrate root and branch transformations, they generally end up layering additional tools and applications on top of, or alongside, the ones they already have to smooth the transition.

The enemy of vulnerability management? Unrealistic expectations
2022-07-13 03:30

As an experienced vulnerability management professional and a former system administrator who specialized in patching and remediated 800,000 vulnerabilities over the course of my career, I can offer some realistic perspective on this topic. One reoccurring discussion I've had is how long it takes for a new vulnerability to get exploited.