Security Software
Security | News, how-tos, features, reviews, and videos
12 steps to building a top-notch vulnerability management program
Security experts share their best advice for the essential ingredients of a solid vulnerability management program, including foundational elements to put in place, workflows to establish, who to involve, and metrics to track.
Five Eyes nations warn MSPs of stepped-up cybersecurity threats
The warning likely comes in response to an increase in attacks on managed service providers, through which threat actors can access their clients.
HackerOne launches Attack Resistance Management solution to boost cyber resilience
Vulnerability coordination and bug bounty platform says its new solution addresses attack resistance gaps by blending the security expertise of ethical hackers with asset discovery, continuous assessment, and process enhancement.
New attack surface management product takes full-stack aim at software supply chain threats
Data Theorem's Supply Chain Secure offers continuous runtime analysis and dynamic inventory discovery.
Syxsense launches vulnerability monitoring and remediation solution
The new solution promises to address three key elements of endpoint security – vulnerabilities, patching and compliance.
15 most exploited vulnerabilities of 2021
Global cybersecurity advisory highlights the 15 most targeted vulnerabilities of 2021, indicating that attackers targeted exploits both old and new last year.
Proficio launches detection and response service to tackle identity-based threats
MDR firm claims solution is the industry’s only vendor-agnostic open XDR solution that supports identity threat detection and response.
Drones as an attack vector: Vendors need to step up
Growing commercial use and few built-in defenses make drones an attractive target for malicious actors.
Bitdefender enters native XDR market with new offering
GravityZone XDR promises to reduce attacker dwell time with robust detection, quick triage, and automated threat containment.
Russia’s AI setbacks will likely heighten its cyber aggression
As sanctions hamper Russia's plans for AI dominance, it might turn up its cyber activities to hamper other countries' AI efforts.
Who is your biggest insider threat?
Phishing simulations aren't enough for identifying your organization’s most vulnerable insiders or minimizing their risk.
Axis Security releases security service edge offering Atmos
Atmos integrates zero-trust network access (ZTNA), secure web gateway (SWG), and cloud access security broker (CASB) capabilities to deliver a full security service edge (SSE) platform designed to provide secure connectivity over...
CrowdStrike and Mandiant form strategic partnership to protect organizations against cyber threats
Vendors say the partnership combines CrowdStrike’s Falcon platform with Mandiant’s breach investigation and response services offering tighter platform integrations, industry-leading intelligence, and shared expertise.
Zoom’s bug bounty ROI clear as program pays $1.8 million to fix over 400 bugs
The firm’s CISO reflects on bug bounty ROI and selling the concept to senior leadership.
Best advice for responding to today's biggest cyber threats
Scary new threats don't necessarily require big changes to your security infrastructure. These simple actions can be more effective and less disruptive.
New insider threat: Bad business decisions that put IP at risk
The U.S. FTC forced Weight Watchers to destroy algorithms after it violated privacy laws, giving CISOs another worry over protecting intellectual property.
Russia-linked cyberattacks on Ukraine: A timeline
Cyber incidents are playing a central role in the Russia-Ukraine conflict. Here's how events are unfolding along with unanswered questions.
Praetorian launches ML-powered Nosey Parker secrets scanner
The machine learning-based secrets scanner has been added to the vendor’s Chariot Platform and promises faster, context-based matching.