Vulnerability Management Program Best Practices

An enterprise vulnerability management program can reach its full potential when it is built on well-established foundational goals that address the information needs of all stakeholders, when its output is tied back to the goals of the enterprise and … Continue reading Vulnerability Management Program Best Practices

Climbing the Vulnerability Management Mountain: Reaching Maturity Level 1

The time at ML:0 can be eye-opening form many organizations. There are generally a lot of assets discovered that are new or had been forgotten about. Almost every organization discovers their own Methuselah; this is the system that has been around fore… Continue reading Climbing the Vulnerability Management Mountain: Reaching Maturity Level 1

Information Disclosure Vulnerabilities – Ryan Kelso – ASW #78

Information Disclosure Vulnerabilities
The post Information Disclosure Vulnerabilities – Ryan Kelso – ASW #78 appeared first on Security Weekly. Continue reading Information Disclosure Vulnerabilities – Ryan Kelso – ASW #78

Security News: September 12, 2019 – PSW #619

Security News: September 12, 2019
The post Security News: September 12, 2019 – PSW #619 appeared first on Security Weekly. Continue reading Security News: September 12, 2019 – PSW #619

Black Hat Interviews: DenimGroup, SCYTHE, & Eclypsium – ESW #153

Black Hat Interviews: DenimGroup, SCYTHE, & Eclypsium
The post Black Hat Interviews: DenimGroup, SCYTHE, & Eclypsium – ESW #153 appeared first on Security Weekly. Continue reading Black Hat Interviews: DenimGroup, SCYTHE, & Eclypsium – ESW #153

Sponsored: Physical Servers and Endpoints Require the Same Protection as VMs


The ability to easily restore critical data and applications always comes down to the level of priority organizations give to their backup and recovery architectures. The low-hanging fruit from a datacenter perspective is protecting virtual machines.

The post Sponsored: Physical Servers and Endpoints Require the Same Protection as VMs appeared first on Petri.

Continue reading Sponsored: Physical Servers and Endpoints Require the Same Protection as VMs

4 Fundamentals That Make Your Vulnerability Management (VM) Program Less Effective

If you are a security practitioner, then you may have noticed that much of the security industry exists because of vulnerabilities. Regardless of what job position you occupy, vulnerabilities are oftentimes the reason why you wake up every morning and … Continue reading 4 Fundamentals That Make Your Vulnerability Management (VM) Program Less Effective

Unpatched Vulnerabilities Caused Breaches in 27% of Orgs, Finds Study

In May 2019, Verizon Enterprise released the 12th edition of its Data Breach Investigations Report (DBIR). Researchers analyzed a total of 41,686 security incidents, of which there were 2,013 data breaches, for the publication. More than half (52 perce… Continue reading Unpatched Vulnerabilities Caused Breaches in 27% of Orgs, Finds Study

To Agent or Not to Agent: That Is the Vulnerability Management Question

With the evolution of technology comes new approaches to solving problems. Sometimes a new approach fixes the problem; sometimes it creates new ones. The good thing is as folks who work in fast-paced, high-tech environment, we information security prof… Continue reading To Agent or Not to Agent: That Is the Vulnerability Management Question