Vulnerability management is the time-consuming process of finding and patching a seemingly unlimited number of potential risks. The National Institute of Standards and Technology (NIST) reports more than 23,000 new…
Browsing CategoryVulnerability Management
IOCs vs. IOAs — How to Effectively Leverage Indicators
Cybersecurity teams are consistently tasked to identify cybersecurity attacks, adversarial behavior, advanced persistent threats and the dreaded zero-day vulnerability. Through this endeavor, there is a common struggle for cybersecurity practitioners…
Call to Patch: Zero Day Discovered in Enterprise Help Desk Platform
In an age where organizations have established a direct dependence on software to run critical business operations, it’s fundamental that they are evaluating their software development lifecycles and that of…
Why Containers in the Cloud Can Be An Attacker’s Paradise
Containers — which are lightweight software packages that include entire runtime environments — have solved the issues of portability, compatibility and rapid, controlled deployment. Containers include an application; all its…
Vulnerability Management: How a Risk-Based Approach Can Increase Efficiency and Effectiveness
Security professionals keep busy. Before you can patch a vulnerability, you need to decide how important it is. How does it compare to the other problems that day? Choosing which…
How Vulnerability Management Can Stop a Data Breach
Vulnerability management may not be the sexiest topic. But, while buzzier topics are certainly important, vulnerability management may just be the key to an effective data security strategy. According to…
What Vulnerability Intelligence Means for Your Organization
Vulnerability intelligence empowers you to defend your organization by prioritizing vulnerabilities that represent real risk to the business.
The post What Vulnerability Intelligence Means for Your Organization appeared first on Recorded Future.
New Ponemon Report: A Programmatic Approach to Vulnerability Management for Hybrid Multicloud
X-Force Red is unveiling a new research study, conducted by the Ponemon Institute, that highlights vulnerability management challenges for on-premises and cloud environments: in other words, hybrid multicloud. The report,…
Shellshock In-Depth: Why This Old Vulnerability Won’t Go Away
Shellshock is a bug in the Bash command-line interface shell that has existed for 30 years and was discovered as a significant threat in 2014. Today, Shellshock still remains a…
What’s New in the 2020 Cost of a Data Breach Report
In a world of uncertainty and change, it’s a comfort that some things are consistent year after year. Now in its 15th year, the annual Cost of a Data Breach…