Securing, Monitoring, and Remediating Immutable Infrastructure

The post Securing, Monitoring, and Remediating Immutable Infrastructure appeared first on Security Weekly. Continue reading Securing, Monitoring, and Remediating Immutable Infrastructure

Citrix releases fix for software bug that hackers ‘will move quickly to exploit’

A newly revealed set of vulnerabilities in popular software made by Citrix, whose clients include Fortune 500 companies, could let hackers who exploit the bugs gain control of a mobile server and steal sensitive data. The Florida-based company, which has dealt with multiple critical vulnerabilities this year, has released fixes for the new round of bugs and urged customers to apply them. “While there are no known exploits as of this writing, we do anticipate malicious actors will move quickly to exploit,” Citrix CISO Fermin J. Serna wrote in a blog post Tuesday. The bugs are in a software product known as Citrix Endpoint Management or XenMobile, which allows clients to remotely connect to corporate networks with their mobile devices. Exploiting one of the bugs could let a hacker steal domain account credentials for a corporate network, according to Andrey Medov, a security researcher at Positive Technologies, which found the […]

The post Citrix releases fix for software bug that hackers ‘will move quickly to exploit’ appeared first on CyberScoop.

Continue reading Citrix releases fix for software bug that hackers ‘will move quickly to exploit’

Shellshock In-Depth: Why This Old Vulnerability Won’t Go Away

Shellshock is a bug in the Bash command-line interface shell that has existed for 30 years and was discovered as a significant threat in 2014. Today, Shellshock still remains a threat to enterprise.   The threat is certainly less risky than in the year of discovery. However, in a year in which security priorities have […]

The post Shellshock In-Depth: Why This Old Vulnerability Won’t Go Away appeared first on Security Intelligence.

Continue reading Shellshock In-Depth: Why This Old Vulnerability Won’t Go Away

Ivanti Extends Alliance With Qualys to Automate Patching Mac Endpoints

Ivanti and Qualys this week announced they have extended their alliance to now include a cloud-based patch management service for both MacOS and more than 70 third-party applications. Nayaki Nayyar, executive vice president and chief product officer f… Continue reading Ivanti Extends Alliance With Qualys to Automate Patching Mac Endpoints

How Cloud Mitigation Techniques Can Help Prevent Ransomware and Phishing Attacks

The COVID-19 pandemic revealed flaws in the American healthcare system that were always there. The only difference now is that those flaws have been brought to light. In the wake of the pandemic, a new host of cyberattacks occurred within the healthcar… Continue reading How Cloud Mitigation Techniques Can Help Prevent Ransomware and Phishing Attacks

Securing Your Environment While Working Remotely

Before the coronavirus pandemic hit, working from home used to be a novelty for many employees. According to a June 2020 IBM Security and Morning Consult “Work From Home Survey,” 80% of respondents say they worked from home either rarely or not at all prior to the pandemic. In-office work allowed employers and information technology […]

The post Securing Your Environment While Working Remotely appeared first on Security Intelligence.

Continue reading Securing Your Environment While Working Remotely

Prioritizing and Closing the Loop in Your Vulnerability Management Program

The post Prioritizing and Closing the Loop in Your Vulnerability Management Program appeared first on Security Weekly. Continue reading Prioritizing and Closing the Loop in Your Vulnerability Management Program

5 Lessons Learned From Patching During a Pandemic

It’s unlikely that any security manager would consider the process of administering security patches as “fun,” but in the age of COVID-19, with continued widespread remote work arrangements turning just about everything on its ear, patching is now an … Continue reading 5 Lessons Learned From Patching During a Pandemic

Refocusing Cybersecurity Best Practices on Security Hygiene

Attackers often increase their efforts to breach networks and systems during troubling times. As organizations around the world focus on the COVID-19 pandemic, security hygiene should be a focus, too.

The post Refocusing Cybersecurity Best Practices on Security Hygiene appeared first on Security Intelligence.

Continue reading Refocusing Cybersecurity Best Practices on Security Hygiene

Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce

Promote security awareness among your remote workforce and inform future training efforts by distributing tailored cybersecurity self-assessments to your employees.

The post Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce appeared first on Security Intelligence.

Continue reading Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce