Security News

How to design a third-party risk management framework
2024-07-12 04:30

An effective third-party risk management framework ensures that an organization is not derailed by vendor risks and vulnerabilities. Right after you categorize your third-party vendors based on their importance to your organization, next you must define the scope of your third-party risk management services and framework by identification of the type of third parties involved and the risk factors posed by them.

Develop Valuable Security and Risk Management Skills for Just $30 Through 7/21
2024-07-09 11:15

For either case, you can now develop information security skills with the help of The CISSP Security & Risk Management Training Bundle for just $29.97 through July 21. CISSP: Security & Risk Management covers the security concepts that provide the foundation for all of the other domains.

Portainer: Open-source Docker and Kubernetes management
2024-07-01 04:30

Portainer Community Edition is an open-source, lightweight service delivery platform for containerized applications. "I created Portainer, initially for my own needs. Back in 2016 I was operating a Public Cloud provider in Asia, and wanted to offer a Container as a Service solution to market. At the time, that meant Docker. There were no Cloud Provider management UI's for Docker then, so I created Portainer to act as such. In a way, Portainer enabled a domestic market version of AWS ECS before ECS was popular. However, Portainer quickly took on a life of its own. I open-sourced the UI, which was"discovered" and blogged about, and it took off.

Enterprises increasingly turn to cloud and AI for database management
2024-06-27 03:00

Across various tasks, from predictive analytics to code generation, organizations in all sectors are exploring how AI can add value and increase efficiency. In this Help Net Security video, Ryan Booz, PostgreSQL Advocate at Redgate, discusses the key findings of Redgate's State of the Database Landscape Report.

New Attack Technique Exploits Microsoft Management Console Files
2024-06-25 10:42

Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files to gain full code execution using Microsoft Management...

CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0
2024-06-25 03:30

Qualys CyberSecurity Asset Management 3.0 consolidates asset discovery and risk assessment into a single solution. A key differentiator of Qualys CyberSecurity Asset Management 3.0 is in the way its External Attack Surface Management technology works.

Tor Browser 13.5 brings Android enhancements, better bridge management
2024-06-21 14:26

The Tor Project has released Tor Browser 13.5, bringing several improvements and enhancements for Android and desktop versions. The Tor Browser is a specialized open-source web browser designed for anonymous browsing by routing the user's traffic through thousands of volunteer-run servers called nodes/relays, which constitute the Tor network.

AI’s role in accelerating vulnerability management
2024-06-10 04:45

As we integrate AI more deeply into vulnerability management processes, organizations can expect enhanced security postures and a shift towards a more proactive and predictive approach to handling cybersecurity threats. AI has some major limitations and even security concerns, especially regarding vulnerability management.

Webinar: Exposure management and your attack surface
2024-06-06 08:00

Your business, attack surface, and threat landscape are not static-they are constantly changing. New vulnerabilities are disclosed hourly, new exploits for old vulnerabilities are publicly released, and threat actors update their techniques continuously.

New Research Warns About Weak Offboarding Management and Insider Risks
2024-05-29 11:31

A recent study by Wing Security found that 63% of businesses may have former employees with access to organizational data, and that automating SaaS Security can help mitigate offboarding risks. ...