Security News

Focus on What Matters Most: Exposure Management and Your Attack Surface
2024-08-23 10:55

Read the full article for key points from Intruder’s VP of Product, Andy Hornegold’s recent talk on exposure management. If you’d like to hear Andy’s insights first-hand, watch Intruder’s...

How passkeys eliminate password management headaches
2024-08-15 04:00

When passkeys are implemented, workers experience a 75% reduction in sign-in time and a 95% reduction in password resets. IT teams especially benefit from passkeys eliminating the need for password management, freeing up valuable IT time and resources typically used in addressing password-related issues.

IntelOwl: Open-source threat intelligence management
2024-08-14 04:30

IntelOwl is an open-source solution designed for large-scale threat intelligence management. It integrates numerous online analyzers and advanced malware analysis tools, providing comprehensive...

Shorter TLS certificate lifespans expected to complicate management efforts
2024-08-09 04:00

76% of security leaders recognize the pressing need to move to shorter certificate lifespans to improve security, according to Venafi. 81% of security leaders believe Google's proposed plans to shorten TLS certificate lifespans from 398 days to 90 days will amplify existing challenges they have around managing certificates.

Hacker wipes 13,000 devices after breaching classroom management platform
2024-08-06 14:15

A hacker has breached Mobile Guardian, a digital classroom management platform used worldwide, and remotely wiped data from at least 13,000 student's iPads and Chromebooks. [...]

AI expected to improve IT/OT network management
2024-08-05 03:00

The report provides a comprehensive look at the challenges and opportunities as organizations strive to build a secure and efficient industrial networking foundation. "Operational technology, and specifically the network supporting industrial operations, has become a key differentiator for organizations globally," said Vikas Butaney, SVP and GM, Cisco Networking - SD-WAN, Multicloud and Industrial IoT. "This research spotlights how IT and OT leaders recognize that strengthening their OT security posture is critical to drive business resiliency, improve efficiencies and prepare for the next wave of innovation with AI," Butaney continued.

Review: Action1 – Simple and powerful patch management
2024-07-30 04:10

Although endpoint anti-malware and other security controls are now standard at the operating system level, keeping all endpoint software up-to-date and secure remains an open issue for many organizations. Having worked with many enterprise security software, I noticed that established market players tend to accumulate substantial technical debt, which translates into bloated endpoints that spawn several processes and services bolted together as new functionalities get added, ultimately noticeably hitting endpoint performance and hampering employee productivity.

Why a strong patch management strategy is essential for reducing business risk
2024-07-29 04:00

Livne explains the role of effective patch management in minimizing business risk and maintaining strong cybersecurity. Can you speak to the importance of a good patch management strategy in reducing business risk?

Patch management still seemingly abysmal because no one wants the job
2024-07-25 07:27

Coupled with an exploding ecosystem of third-party apps, endpoint management tools that aren't really designed to handle patch management, bandwidth issues, and architectural challenges, IT teams have "An overwhelming amount of work to do," Hewitt told us. Endpoint management biz Adaptiva revealed in its 2023 state of patch handling report [PDF] that the average organization manages around 2,900 software applications, and 69 percent of IT teams believe it's impossible to get all of them patched on schedule.

Infisical: Open-source secret management platform
2024-07-24 04:00

Infisical is an open-source secret management platform developers use to centralize application configurations and secrets, such as API keys and database credentials, while also managing their...