Security News

Why open source software supply chain management is worse than you think
2021-09-15 13:00

The seventh annual State of the Software Supply Chain Report from Sonatype found that developers think software management practices are in much better shape than what conditions on the ground indicate. The analysis found that the majority of respondents use an ad hoc approach to software supply chain management for most parts of the process, except for remediation and inventory.

Why should enterprises invest in machine identity management tools?
2021-09-03 04:30

According to the research, almost all of the IT and security leaders surveyed reported that their organizations are likely to start taking the steps needed to overcome these issues by enhancing their machine identity management approach, but these leaders also expect to face challenges. According to Gartner, "Digital transformation has led to an explosion in the number of machines - such as workloads, code, applications and containers - that need to identify themselves and communicate with each other. As a result, several technology providers have built tools that can help clients discover and manage machine identities across hybrid and multicloud environments. Managing machine identities has become critical, as nonhuman entities are now at the leading edge of digital transformation."

Asset management investment to focus on technology and data infrastructure
2021-09-02 03:00

Investment in technology and data infrastructure sit at the top of asset managers' priorities as they position themselves to deliver business growth in the recovery from the COVID-19 pandemic. 56% say their investment will focus on these areas over the next 12 months and for 47% on ensuring ESG compliance across their product range.

Top Strategies That Define the Success of a Modern Vulnerability Management Program
2021-08-27 13:00

Modern vulnerability management programs require a strategy that defines what success means for your organization's cybersecurity goals. With the changing work norms ushered in by the pandemic, endpoints have become an easy exploit target, and your vulnerability management program should give equal importance to managing both network and endpoint vulnerabilities.

Vulnerability management is facing three core problems: Here’s how to solve them
2021-08-26 06:00

From the get-go, too many organizations have an outdated idea of what vulnerability management entails. A holistic approach to vulnerability management includes identifying, reporting, assessing and prioritizing exposures.

Navigating Vendor Risk Management as IT Professionals
2021-08-23 07:09

Let's look at navigating vendor risk management as IT professionals and see how businesses can accomplish this in a highly complex cybersecurity world. To meet the cybersecurity challenges in working with third-party vendors, organizations must focus on vendor risk management.

Navigating Vendor Risk Management as IT Professionals
2021-08-23 07:09

Let's look at navigating vendor risk management as IT professionals and see how businesses can accomplish this in a highly complex cybersecurity world. To meet the cybersecurity challenges in working with third-party vendors, organizations must focus on vendor risk management.

Data management software investments soaring, yet few enterprises realize ROI
2021-08-20 03:30

Enterprises are pouring money into data management software - to the tune of $73 billion in 2020 - but are seeing very little return on their data investments. According to a study from Dremio and Wakefield Research, only 22% of the data leaders surveyed have fully realized ROI in the past two years, with 56% of data leaders having no consistent way of measuring it.

Bugs in gym management software let hackers wipe fitness history
2021-08-13 14:18

Security researchers found vulnerabilities in the Wodify fitness platform that allows an attacker to view and modify user workouts from any of the more than 5,000 gyms that use the solution worldwide. In a report published today, researchers at cybersecurity company Bishop Fox disclosed a set of vulnerabilities in the Wodify platform that could affect not only users' workouts and personal information but also the financials of a gym.

Mandiant acquires Intrigue to add attack surface management technology to its SaaS portfolio
2021-08-11 23:30

Intrigue's attack surface management technology will be integrated into the Mandiant Advantage platform, enabling organizations to discover, monitor, and manage risk across their entire attack surface. By offering Intrigue's technology through the Mandiant Advantage platform, customers will be able to address critical gaps in their security programs by leveraging the latest attack surface management capabilities in an easy-to-use software-as-a-service platform.