Future-proofing asset and vulnerability intelligence in response to CISA’s BOD 23-01

Modern environments have become more dynamic and the need for equally progressive asset discovery techniques has intensified. The new Cybersecurity and Infrastructure Security Agency (CISA) Binding Operational Directive (BOD) 23-01 recognizes this fact… Continue reading Future-proofing asset and vulnerability intelligence in response to CISA’s BOD 23-01

Nmap 7.93, the 25th anniversary edition, has been released

Nmap is a widely used free and open-source network scanner. It’s used for network inventorying, port scanning, managing service upgrade schedules, monitoring host or service uptime, etc. It works on most operating systems: Linux, Windows, macOS, … Continue reading Nmap 7.93, the 25th anniversary edition, has been released

Wearable sonar tracks facial expressions using sound instead of cameras

Engineers at Cornell University have developed a new wearable device that can monitor a person’s facial expressions through sonar and recreate them on a digital avatar. Removing cameras from the equation could alleviate privacy concerns.Continue Readin… Continue reading Wearable sonar tracks facial expressions using sound instead of cameras

The most common exploit paths enterprises leave open for attackers

Exposed version control repositories, leaked secrets in public code repositories, a subdomain vulnerable to takover, exposed Amazon S3 buckets, and Microsoft Exchange Server servers vulnerable to CVE-2021-42321 exploitation are the most common exploit … Continue reading The most common exploit paths enterprises leave open for attackers

An offensive mindset is crucial for effective cyber defense

As ransomware attacks continue to increase and cybercriminals are becoming more sophisticated, the federal government has implemented a more proactive approach when it comes to cybersecurity. As evidenced by its stated strategy to adopt a zero trust ar… Continue reading An offensive mindset is crucial for effective cyber defense

Why a modern vulnerability management strategy requires state-of-the-art solutions

In this interview with Help Net Security, Stephen Carter, CEO at Nucleus Security, explains the importance of having a vulnerability management strategy within an organization, what are the biggest challenges and what should be done to overcome them. V… Continue reading Why a modern vulnerability management strategy requires state-of-the-art solutions

Solving the problem of secrets sprawling in corporate codebases

GitGuardian announced the results of its report which extends its previous edition focused on public GitHub by depicting a realistic view of the state of secrets sprawl in corporate codebases. The data reveals that on average, in 2021, a typical compan… Continue reading Solving the problem of secrets sprawling in corporate codebases

The importance of implementing security scanning in the software development lifecycle

Veracode published a research that finds most applications are now scanned around three times a week, compared to just two or three times a year a decade ago. This represents a 20x increase in average scan cadence between 2010 and 2021. Scan frequency … Continue reading The importance of implementing security scanning in the software development lifecycle

Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business

Vulnerability scanners are still essential tools for defenders protecting enterprise and government networks. But given the rapidly increasing complexity of today’s cyber threat landscape, these scanners are not enough to win the fight against an… Continue reading Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business