Top Five Security Focus Areas for Mainframes

Reading Time: 5 minutes Given trends like data center consolidation, hybrid cloud models and new designs that allow mainframes to operate in traditional environments, what better time to reevaluate your mainframe security?

The post Top Five Security Focus Areas for Mainframes appeared first on Security Intelligence.

Continue reading Top Five Security Focus Areas for Mainframes

Published Exploits for Accessing SAP Systems Put Security Teams on Alert

Researchers published two pieces of exploit code that can allow anyone to interact with an organization’s SAP enterprise resource planning platform and perform unauthorized transactions.

The post Published Exploits for Accessing SAP Systems Put Security Teams on Alert appeared first on Security Intelligence.

Continue reading Published Exploits for Accessing SAP Systems Put Security Teams on Alert

Vulnerability Assessments Versus Penetration Tests: A Common Misconception

Vendors, cybersecurity professionals and marketing teams often use the terms “penetration testing” and “vulnerability assessment” interchangeably, mixing two completely different security engagements.

The post Vulnerability Assessments Versus Penetration Tests: A Common Misconception appeared first on Security Intelligence.

Continue reading Vulnerability Assessments Versus Penetration Tests: A Common Misconception

Calling Into Question the CVSS

X-Force Red believes vulnerabilities should be ranked based on the importance of the exposed asset and whether the vulnerability is being weaponized by criminals, not necessarily its CVSS score.

The post Calling Into Question the CVSS appeared first on Security Intelligence.

Continue reading Calling Into Question the CVSS

How Secure Are Medical IoT Devices? Catherine Norcom Has Her Finger on the Pulse of the Industry

We chatted with X-Force Red’s resident hardware hacker, Catherine Norcom, about the FDA’s recent guidance on securing medical IoT devices.

The post How Secure Are Medical IoT Devices? Catherine Norcom Has Her Finger on the Pulse of the Industry appeared first on Security Intelligence.

Continue reading How Secure Are Medical IoT Devices? Catherine Norcom Has Her Finger on the Pulse of the Industry

New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value

Garner’s new report recommends factoring severity, asset value and active exploits into your vulnerability management process.

The post New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value appeared first on Security Intelligence.

Continue reading New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value