Tackling cyber risks head-on using security questionnaires

In this Help Net Security interview, Gaspard de Lacroix-Vaubois, CEO at Skypher, talks about the implementation of security questionnaires and how they facilitate assessments and accountability across all participants in the technology supply chain, fo… Continue reading Tackling cyber risks head-on using security questionnaires

Despite rising insider risk costs, budgets are being wasted in the wrong places

The cost of an insider risk is the highest it’s ever been, as organizations spend more time than ever trying to contain insider incidents, according to DTEX Systems. The average annual cost of an insider risk has increased to $16.2 million – a 40… Continue reading Despite rising insider risk costs, budgets are being wasted in the wrong places

Security concerns and outages elevate observability from IT niche to business essential

Enterprises that leverage observability increase operational efficiency and grow revenue, according to SolarWinds. The report explores how enterprises can act proactively to maximise the advantages of their observability solutions, integrate best pract… Continue reading Security concerns and outages elevate observability from IT niche to business essential

The blueprint for a highly effective EASM solution

In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should possess, … Continue reading The blueprint for a highly effective EASM solution

Fresh perspectives needed to manage growing vulnerabilities

In its inaugural 2023 Offensive Security Vision Report, NetSPI unveils findings that highlight vulnerability trends across applications, cloud, and networks. Vulnerability patterns The report offers a look back β€” and forward β€” at some of the most signi… Continue reading Fresh perspectives needed to manage growing vulnerabilities

Only 10% of vulnerabilities are remediated each month

A research from SecurityScorecard and The Cyentia Institute revealed only 60% of organizations have improved their security posture despite a 15-fold increase in cyber-attacks over the last three years. The joint research sought to measure the speed of… Continue reading Only 10% of vulnerabilities are remediated each month

Cloud Auto-Remediation and Enforcement with Tripwire Configuration Manager

Determining the security posture for an increasing quantity of cloud accounts and services used by many organizations can feel overwhelming, but Tripwire Configuration Manager can help you find, fix, and even enforce settings for common security proble… Continue reading Cloud Auto-Remediation and Enforcement with Tripwire Configuration Manager

As attacks on Exchange servers escalate, Microsoft investigates potential PoC exploit leak

Microsoft Exchange servers around the world are still getting compromised via the ProxyLogon (CVE-2021-26855) and three other vulnerabilities patched by Microsoft in early March. While the initial attacks were attributed by Microsoft to a threat actor … Continue reading As attacks on Exchange servers escalate, Microsoft investigates potential PoC exploit leak

Why you should make cyber risk a business gain, not a loss

As companies continue to respond to the global pandemic, millions of their employees are working remotely, often from home. While this is the recommended response, it’s also creating new cyber risks. More specifically, organizations face four daunting … Continue reading Why you should make cyber risk a business gain, not a loss