Vulnerability scanning vs penetration testing: What’s the difference?

If you’ve ever got stuck while trying to wrap your head around the differences between penetration testing and vulnerability scanning, read through to get the perfect breakdown.
The post Vulnerability scanning vs penetration testing: What’s the differe… Continue reading Vulnerability scanning vs penetration testing: What’s the difference?

Determine More Effective Countermeasures With Vulnerability Scanning

Many organizations today store their most important data on their network, which makes it of vital importance that it is as secure as possible. Hackers will be looking to exploit.
The post Determine More Effective Countermeasures With Vulnerability Sca… Continue reading Determine More Effective Countermeasures With Vulnerability Scanning

Top 10 Tips to Protect Against OWASP Top 10 Vulnerabilities

OWASP Top 10 vulnerabilities is a list of the 10 most common security vulnerabilities in applications. The Top 10 OWASP web application security vulnerabilities are updated every 3-4 years. Last.
The post Top 10 Tips to Protect Against OWASP Top 10 Vul… Continue reading Top 10 Tips to Protect Against OWASP Top 10 Vulnerabilities

Palo Alto Networks Extends Scope of CSPM Platform

Palo Alto Networks today updated its cloud security posture management (CSPM) platform to include a range of capabilities that make it simpler for security teams to prioritize which cloud threats they respond to first. Ankur Shah, vice president of pr… Continue reading Palo Alto Networks Extends Scope of CSPM Platform

TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions

A new “TrickBoot” module scans for vulnerable firmware and has the ability to read, write and erase it on devices. Continue reading TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions

Learning More About Vulnerability Scanning

A recent article published on the G2 Learning Hub was titled “The Top 5 Vulnerability Scanners You Need to Patrol Security Grids,” and while it covered the list of what the author considered to be the top 5, what really caught my attention about the ar… Continue reading Learning More About Vulnerability Scanning

Winning at Vulnerability Management: 8 Best Practices

To pre-empt cybersecurity threats, today’s enterprises must have policies, processes and tools in place to not only defend against attacks but also strengthen their security posture by reducing organizational risk. Vulnerability management (VM) progra… Continue reading Winning at Vulnerability Management: 8 Best Practices

Using Components with Known Vulnerabilities

When an organization has a breach, you would like to imagine that the attacker crafted a new exploit, leveraging a zero-day vulnerability that no one has any protection against. However, It is far more likely that the attacker exploited well-known vuln… Continue reading Using Components with Known Vulnerabilities

ZeroNorth Raises $10M to Advance Risk Orchestration

ZeroNorth, a provider of a namesake platform for orchestrating risk management within the context of application development projects, announced it has garnered another $10 million in funding. Company CEO John Worrall said most of the funds are earmar… Continue reading ZeroNorth Raises $10M to Advance Risk Orchestration

WebARX — A Defensive Core For Your Website

Estonian based web security startup WebARX, the company who is also behind open-source plugin vulnerability scanner WPBullet and soon-to-be-released bug bounty platform plugbounty.com, has a big vision for a safer web.

It built a defensive core for we… Continue reading WebARX — A Defensive Core For Your Website