Getting Application Security Back on the Rails

In its Interagency Report 7695, the National Institute of Standards and Technology (NIST) defined an application as “a system for collecting, saving, processing, and presenting data by means of a computer.” This broad term covers enterprise application… Continue reading Getting Application Security Back on the Rails

Climbing the Vulnerability Management Mountain: Reaching the Summit (VM Maturity Level 5)

Only the truly committed ever reach the summit of anything. This sentiment holds true for vulnerability management. An organization cannot reach the summit without a serious commitment to fund and staff the program appropriately across the organization… Continue reading Climbing the Vulnerability Management Mountain: Reaching the Summit (VM Maturity Level 5)

¿Trabajando desde casa debido al COVID-19? Lo que tú y tu organización deben considerar

En primer lugar, nuestros corazones están con aquellos en todo el mundo afectados por el coronavirus (COVID-19). El director del Centro de Control y Prevención de Enfermedades (CDC) de EE.UU., que asesora al país sobre salud pública… Continue reading ¿Trabajando desde casa debido al COVID-19? Lo que tú y tu organización deben considerar

Working from Home during COVID-19? What You and Your Organization Need to Consider

First and foremost, our hearts go out to those around the world impacted by the COVID-19 virus. The director of the U.S. Center for Disease Control & Prevention (CDC), who advises the country on public health, has indicated that the risk to the gen… Continue reading Working from Home during COVID-19? What You and Your Organization Need to Consider

Climbing the Vulnerability Management Mountain: Reaching Maturity Level 4

The climb is getting steeper, but thanks to hard work, vision and insight are much keener. At ML:4, all assets are scanned by a combination of agent and remote scans on a normal cadence. This will generate a lot of data dictated by threat and patch pri… Continue reading Climbing the Vulnerability Management Mountain: Reaching Maturity Level 4

Climbing the Vulnerability Management Mountain: Reaching Maturity Level 3 – Base Camp

ML:3 is base camp, and getting here means you have reached a level that others have only dreamed about. At this level, the VM program is very good, and your visibility into threats to the environment is much better than it has ever been. Prioritizing A… Continue reading Climbing the Vulnerability Management Mountain: Reaching Maturity Level 3 – Base Camp

Climbing the Vulnerability Management Mountain: Reaching Maturity Level 2

The path is starting to get steeper now as we climb to ML2. It is time to start defining a vulnerability management program with objectives and goals. This program is expected to grow and evolve over time as the organization grows and evolves. Document… Continue reading Climbing the Vulnerability Management Mountain: Reaching Maturity Level 2

The Evolution of Phishing: The Spear Is Aimed at You

You can’t go a week without seeing a story about a data breach or ransomware hitting organizations. These breaches can be very costly, but they still continue to show up. Are the good guys not winning the cybersecurity war? Organizations invest m… Continue reading The Evolution of Phishing: The Spear Is Aimed at You

Climbing the Vulnerability Management Mountain: Reaching Maturity Level 1

The time at ML:0 can be eye-opening form many organizations. There are generally a lot of assets discovered that are new or had been forgotten about. Almost every organization discovers their own Methuselah; this is the system that has been around fore… Continue reading Climbing the Vulnerability Management Mountain: Reaching Maturity Level 1

Climbing the Vulnerability Management Mountain: Taking the First Steps Towards Enlightenment

Just as you would map a hike or climb by creating waypoints you plan to hit each day, you must plan your vulnerability management process by creating similar goals. We call these goals Maturity Levels, from ML0 to ML5, as we defined them in the last bl… Continue reading Climbing the Vulnerability Management Mountain: Taking the First Steps Towards Enlightenment