Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2023-12-12 18:00:14 |
ALERTE NOUVELLES: La recherche EASM de Detectify \\ révèle les meilleures vulnérabilités négligées de 2023 News alert: Detectify\\'s EASM research reveals top overlooked vulnerabilities from 2023 (lien direct) |
Stockhom, Suède & # 38;Boston, Mass., 12 décembre 2023 & # 8211; détection , la plate-forme externe de gestion de la surface d'attaque propulsée par des pirates éthiques d'élite, a publié aujourd'hui sa " State of EASM 2023 ” Rapport.
La recherche incorporeInsignes du client de Detectify \'s & # 8230; (plus…)
Stockhom, Sweden & Boston, Mass., Dec. 12, 2023 – Detectify, the External Attack Surface Management platform powered by elite ethical hackers, has today released its “State of EASM 2023” report.
The research incorporates insights from Detectify\'s customer … (more…) |
Studies
Vulnerability
|
|
★★★
|
|
2023-04-03 07:01:47 |
Essai d'invité: le rôle avancé \\ 'VM \\' est parfaitement adapté pour jouer dans la lutte contre les cyberattaques modernes GUEST ESSAY: The role advanced \\'VM\\' is ideally suited to play in combating modern cyber attacks (lien direct) |
Les cyberattaques modernes sont ingénieuses & # 8212;et la gestion traditionnelle de la vulnérabilité, ou VM, n'est tout simplement plus très efficace.
lié: Adopter une approche d'évaluation des risques de la machine virtuelle
Contrairement à une cyberattaque typique qui exploite une vulnérabilité logicielle, les cyberattaques récentes exploitent d'autres & # 8230; (Plus…)
Modern cyber attacks are ingenious — and traditional vulnerability management, or VM, simply is no longer very effective.
Related: Taking a risk-assessment approach to VM
Unlike a typical cyber attack that exploits a software vulnerability, recent cyber attacks exploit other … (more…) |
Vulnerability
|
|
★★
|
|
2022-05-31 10:54:34 |
RSAC insights: Why vulnerability management absolutely must shift to a risk-assessment approach (lien direct) |
Vulnerability management, or VM, has long been an essential, if decidedly mundane, component of network security.
Related: Log4J’s long-run risks
That's changing — dramatically. Advanced VM tools and practices are rapidly emerging to help companies mitigate a sprawling array of … (more…) |
Tool
Vulnerability
|
|
|
|
2022-03-29 17:49:32 |
MY TAKE: Log4j\'s big lesson – legacy tools, new tech are both needed to secure modern networks (lien direct) |
Log4j is the latest, greatest vulnerability to demonstrate just how tenuous the security of modern networks has become.
Log4j, aka Log4Shell, blasted a surgical light on the multiplying tiers of attack vectors arising from enterprises' deepening reliance on open-source software.… (more…) |
Vulnerability
|
|
|
|
2022-03-07 12:10:20 |
GUEST ESSAY: Why rigorous vulnerability management is crucial to protecting critical systems (lien direct) |
As companies accelerate their reliance on agile software development, cloud-hosted IT infrastructure and mobile applications, vulnerability management (VM) has an increasingly vital security role to play.
Related: Log4j vulnerability translates into vast exposures
Not only does VM contribute to the … (more…) |
Vulnerability
|
|
|
|
2021-12-14 11:40:41 |
SHARED INTEL: LogJ4 vulnerability presents a gaping attack vector companies must heed in 2022 (lien direct) |
As we close out 2021, a gargantuan open-source vulnerability has reared its ugly head.
Related: The case for ‘SBOM’
This flaw in the Apache Log4J logging library is already being aggressively probed and exploited by threat actors — and it … (more…) |
Threat
Vulnerability
|
|
|
|
2019-04-18 08:46:03 |
NEW TECH: Brinqa takes a \'graph database\' approach to vulnerability management, app security (lien direct) |
Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance market Enterprises, especially, tend to be methodical and plodding. Digital transformation is all about high-velocity innovation and on-the-fly change. The yawning gap between […] |
Vulnerability
|
|
|
|
2018-09-06 10:24:04 |
NEW TECH: Critical Start applies \'zero-trust\' security model to managed security services (lien direct) |
All companies today are exposed to intense cyber-attacks. And yet the vast majority simply do not have the capability to effectively defend their networks. That's where managed security services providers, or MSSPs, come in. MSSPs monitor and manage cybersecurity systems as a contracted service. This can include spam filtering, malware detection, firewalls upkeep, vulnerability management […] |
Spam
Malware
Vulnerability
|
|
★★★★★
|