Security News

Best IT Asset Management Software for 2023
2023-09-18 15:58

IT asset management software comparison Asset Panda: Best for allowing unlimited users. Through UpKeep's Asset Operations Management Platform, teams can monitor asset maintenance, manage assets throughout their life cycles and improve asset performance.

ORBCOMM ransomware attack causes trucking fleet management outage
2023-09-15 13:33

Trucking and fleet management solutions provider ORBCOMM has confirmed that a ransomware attack is behind recent service outages preventing trucking companies from managing their fleets.Customers have told BleepingComputer that ORBCOMM has not shared what was causing the outage and only recently said that they hope to restore services by September 29th. After contacting the company, ORBCOMM confirmed they suffered a ransomware attack on September 6th that impacted the company's FleetManager solution and Blue Tree product line.

Access Management Policy
2023-09-13 16:00

Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company.

9 Alarming Vulnerabilities Uncovered in SEL's Power Management Products
2023-09-06 10:13

Nine security flaws have been disclosed in electric power management products made by Schweitzer Engineering Laboratories. "The most severe of those nine vulnerabilities would allow a threat actor to facilitate remote code execution on an engineering workstation," Nozomi Networks said in a report published last week.

SEC cybersecurity rules shape the future of incident management
2023-08-16 04:00

The SEC adopted rules requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance. The Commission also adopted rules requiring foreign private issuers to make comparable disclosures.

Minimizing Risk Through Proactive Apple Device Management: Addigy
2023-08-11 19:38

As device diversification continues and more Apple devices enter corporate environments, IT leaders face added management complexity. This new device management standard is built around the concept of shifting device management from centralized servers onto the devices themselves.

5 Best Encryption Key Management Software for 2023
2023-08-10 17:39

What is the best encryption key management software for your business? Use our guide to compare the features of our top picks.

What is Data Security Posture Management (DSPM)?
2023-08-01 10:15

Data Security Posture Management is an approach to securing cloud data by ensuring that sensitive data always has the correct security posture - regardless of where it's been duplicated or moved...

Relying on CVSS alone is risky for vulnerability management
2023-07-31 04:00

A vulnerability management strategy that relies solely on CVSS for vulnerability prioritization is proving to be insufficient at best, according to Rezilion. Relying solely on a CVSS severity score to assess the risk of individual vulnerabilities was shown to be equivalent to randomly selecting vulnerabilities for remediation.

These 6 Questions Will Help You Choose the Best Attack Surface Management Platform
2023-07-17 10:56

For anyone ready to find an attack surface management vendor, review these six questions before getting started to understand the key features to look for in an ASM platform and the qualities of the vendor who supports it. Does your platform have the capability to discover the unknown? How do you prevent alert fatigue, prioritize alerts and remove false positives? Can you track attack surface changes over time? How do you plan to evolve the platform going forward? What services related to ASM do you offer? Can we demo or test run the platform?