Transitioning from vulnerability management to vulnerability remediation

Like many people, I’m glad 2020 is almost over. I am, however, excited about 2021. Here are three trends I believe will impact how well (or not) companies will be able to remediate vulnerabilities. 2021 will be the year of cloud vulnerability If you th… Continue reading Transitioning from vulnerability management to vulnerability remediation

Most security leaders feel their programs are mature, but data reveals otherwise

84% of security and IT leaders feel their enterprise programs are mature, but a deeper dive reveals a major disconnect between perception and reality, Vulcan Cyber reveals. “We already know most enterprise programs are immature – we see it every day in… Continue reading Most security leaders feel their programs are mature, but data reveals otherwise

Half of IT teams can’t fully utilize cloud security solutions due to understaffing

There are unrealized gaps between the rate of implementation or operation and the effective use of cloud security access brokers (CASB) within the enterprise, according to a global Cloud Security Alliance survey of more than 200 IT and security profess… Continue reading Half of IT teams can’t fully utilize cloud security solutions due to understaffing

In the age of disruption, comprehensive network visibility is key

IT teams require comprehensive visibility into the network driven by a number of factors, including tremendous disruption from the COVID-19 pandemic, relentless technological advances, remote working reaching an all-time high and the expanding security… Continue reading In the age of disruption, comprehensive network visibility is key

The importance of effective vulnerability remediation prioritization

Too many organizations have yet to find a good formula for prioritizing which vulnerabilities should be remediated immediately and which can wait. According to the results of a recent Tenable research aimed at discovering why some flaws go unpatched fo… Continue reading The importance of effective vulnerability remediation prioritization

G Suite admins get context-aware access controls, rule-based automated actions and alerts

Google is rolling out new security capabilities for G Suite Enterprise administrators, allowing them to implement context-aware access controls for users and to create rules to automate actions and alerts through the security center. The company is als… Continue reading G Suite admins get context-aware access controls, rule-based automated actions and alerts

Protect Before You Detect: FlawedAmmyy and the Case for Isolation

Posted by Ratnesh Pandey, Alex Holland and Toby Gray. In June 2019, Microsoft issued warnings about a phishing campaign delivering a new variant of the FlawedAmmyy remote access Trojan (RAT), and a spike in the exploitation of CVE-2017-11882&… Continue reading Protect Before You Detect: FlawedAmmyy and the Case for Isolation

Ransomware: A Persistent Scourge Requiring Corporate Action Now

ASCO is the latest headline-making organization to be hit by ransomware, prompting many companies to consider what to do to minimize their risk. Continue reading Ransomware: A Persistent Scourge Requiring Corporate Action Now

But Can Your AI Recognize Slugs?

The common garden slug is a mystery. Observing these creatures as they slowly emerge from their slimy lairs each evening, it’s hard to imagine how much damage they can do. With paradoxical speed, they can mow down row after row of tender seedlings, leaving nothing but misery in their mucusy …read more

Continue reading But Can Your AI Recognize Slugs?

4 Things SOC Managers Should CARE About in 2019

While most of us make resolutions for personal change in the New Year, meaningful changes in our business lives require a bit more advanced planning. Especially when those changes require budgets, approvals and internal support. As SOC managers and di… Continue reading 4 Things SOC Managers Should CARE About in 2019