Vulnerability Management: How a Risk-Based Approach Can Increase Efficiency and Effectiveness

Security professionals keep busy. Before you can patch a vulnerability, you need to decide how important it is. How does it compare to the other problems that day? Choosing which jobs to do first using vulnerability management tools can be a key element of a smart security strategy. Software vulnerabilities are one of the root […]

The post Vulnerability Management: How a Risk-Based Approach Can Increase Efficiency and Effectiveness appeared first on Security Intelligence.

Continue reading Vulnerability Management: How a Risk-Based Approach Can Increase Efficiency and Effectiveness

Facing a Privacy Breach Under Growing GDPR-inspired Laws Can Pose Challenges for Companies

Almost everyone at this point has heard about the European Union’s (EU) General Data Protection Regulation (GDPR). You’ve probably received an email from a company that you have shopped with explaining the recent changes in their privacy policy. Or, you’ve sat through a GDPR training at work, or you’re simply aware that some of the […]

The post Facing a Privacy Breach Under Growing GDPR-inspired Laws Can Pose Challenges for Companies appeared first on Security Intelligence.

Continue reading Facing a Privacy Breach Under Growing GDPR-inspired Laws Can Pose Challenges for Companies