How the Best Defense Gets Better

Security starts before detection and response, but many organizations focus there first. Mature security teams understand the importance of identification and protection.  Establishing good cyber hygiene and taking proactive measures to secure themsel… Continue reading How the Best Defense Gets Better

The Importance of Transparency: Finding the Balance Between Security and Visibility

Vulnerabilities are a simple fact of life. The goal for vendors and organizations is not to strive to create perfect hardware or software that has no vulnerabilities—there is no such thing. What’s important is ensuring that relevant details and context… Continue reading The Importance of Transparency: Finding the Balance Between Security and Visibility

Qualys Helps Organizations Manage Risk with Cybersecurity Asset Management

You can’t protect what you can’t see. Yes, it is a tad trite at this point. As vendors have focused on comprehensive visibility in recent years, the phrase has almost become something of a buzzword. That in no way changes the truth of the statement, th… Continue reading Qualys Helps Organizations Manage Risk with Cybersecurity Asset Management

Managing Your Assets with Tripwire Enterprise

Asset management is a tricky subject. In many cases, organizations have no idea about how many assets they have, let alone where they are all located.  Fortunately, there are tools that can assist with reaching your asset management goals. While Tripwi… Continue reading Managing Your Assets with Tripwire Enterprise

How to Defend Linux from Attacks

Although Linux is still a fraction of the market share of Microsoft Windows and Mac OS X, its growth continues to accelerate.  Linux will continue to grow at compounded annual growth rate (CAGR) of 19.2% through 2027.  Some of the primary factors for … Continue reading How to Defend Linux from Attacks

Overcoming IoT Asset Management Challenges

The ability to track anything — from the level of coffee left in your pot to a real-time inventory of goods in a warehouse — is compelling in any industry. With the number of IoT devices expected to reach 55.7 billion worldwide by 2025, security teams… Continue reading Overcoming IoT Asset Management Challenges

Reading the Application Security Tea Leaves – How to Interpret the Analyst Reports

There are a number of industry analyst reports on application security.  Each analyst firm and report takes its own slice of the market to analyze and report on vendors within that market.  For example, the Forrester Wave focuses on Static Application… Continue reading Reading the Application Security Tea Leaves – How to Interpret the Analyst Reports

How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack

The post How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack appeared first on Security Weekly. Continue reading How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack

Integrating Application Security Testing Data to Drive Better Decisions

The post Integrating Application Security Testing Data to Drive Better Decisions appeared first on Security Weekly. Continue reading Integrating Application Security Testing Data to Drive Better Decisions