CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0

In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features, significant advantages, and innovative technologies behind Qualys CyberSecurity Asset Management 3.0. Can you explain the key… Continue reading CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0

CISOs confront mounting obstacles in tracking cyber assets

Monitoring assets in ever-changing settings operating in both development and production stages presents challenges. In this Help Net Security video, Daniel Deeney, CEO at Paladin Cloud, discusses how companies face difficulties identifying security th… Continue reading CISOs confront mounting obstacles in tracking cyber assets

Future-proofing asset and vulnerability intelligence in response to CISA’s BOD 23-01

Modern environments have become more dynamic and the need for equally progressive asset discovery techniques has intensified. The new Cybersecurity and Infrastructure Security Agency (CISA) Binding Operational Directive (BOD) 23-01 recognizes this fact… Continue reading Future-proofing asset and vulnerability intelligence in response to CISA’s BOD 23-01

CISA orders federal agencies to regularly perform IT asset discovery, vulnerability enumeration

A new directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) is ordering US federal civilian agencies to perform regular asset discovery and vulnerability enumeration, to better account for and protect the devices that reside o… Continue reading CISA orders federal agencies to regularly perform IT asset discovery, vulnerability enumeration

How a cyber asset management strategy can help enterprises detect threats

Whether it’s through stolen credentials, phishing attacks, or simply user errors, people continue to pose the greatest risk to cybersecurity. While behavioral attacks are nothing new, Verizon’s recently released Data Breach Investigations Report shows … Continue reading How a cyber asset management strategy can help enterprises detect threats

Critical infrastructure and industrial orgs can test Azure Defender for IoT for free

Azure Defender for IoT – Microsoft’s new security solution for discovering unmanaged IoT/OT assets and IoT/OT vulnerabilities – is now in public preview and can be put to the test free of charge. The solution can alert administrators … Continue reading Critical infrastructure and industrial orgs can test Azure Defender for IoT for free

Realizing Hybrid Asset Discovery with Tripwire Industrial Appliance

Digital attacks continue to weigh on the minds of industrial cybersecurity (ICS) professionals. In a 2019 survey, 88% of ICS experts told Tripwire they were worried about what a digital attack could mean for their industrial organization. The rate was … Continue reading Realizing Hybrid Asset Discovery with Tripwire Industrial Appliance

Why Asset Visibility Is Essential to the Security of Your Industrial Environment

Threats against industrial environments are on the rise. Near the beginning of 2019, for example, Kaspersky Lab revealed that 47% of industrial control system (ICS) computers on which its software was installed suffered a malware infection in the past … Continue reading Why Asset Visibility Is Essential to the Security of Your Industrial Environment

Vulnerability Management Program Best Practices

An enterprise vulnerability management program can reach its full potential when it is built on well-established foundational goals that address the information needs of all stakeholders, when its output is tied back to the goals of the enterprise and … Continue reading Vulnerability Management Program Best Practices

OWASP Application Security Verification Standard – Jay Durga – ASW #76

OWASP Application Security Verification Standard
The post OWASP Application Security Verification Standard – Jay Durga – ASW #76 appeared first on Security Weekly. Continue reading OWASP Application Security Verification Standard – Jay Durga – ASW #76