Threat and Vulnerability Management

Threat and Vulnerability Management | News, how-tos, features, reviews, and videos

security system vulnerabilities - a grid of locks with several unlocked

EPSS explained: How does it compare to CVSS?

The Exploit Prediction Scoring System has its shortcomings, but it can complement CVSS to help better prioritize and assess vulnerability risk.

Microsoft Windows 10X logo, with an abstract wave of technology in the background.

Microsoft Event Log vulnerabilities threaten some Windows operating systems

Two newly discovered vulnerabilities have been found to impact an Internet Explorer-specific Event Log present on operating systems prior to Windows 11.

Two developers collaborate on a project as they review code on a display in their workspace.

Malwarebytes pairs new MDR, EDR for overwhelmed cybersecurity teams

Malwarebytes MDR (managed detection and response) works by pairing EDR (end point detection and response) technology with a dedicated team of security analysts, providing both automated and human lines of defense.

A multitude of arrows pierce a target. [numerous attacks / quantity / severity]

3 actions Latin American leaders must take to reduce risk of cyberattacks

Threat actors are targeting government and private sector organizations across Latin America, so business and political leaders must step up to meet the challenge.

cloud security

Tenable aims to unify your cybersecurity with exposure management platform

Tenable tackles the issue of siloed security apps with a cloud-based exposure management system that pulls in data from diverse types of systems that track a company’s digital assets and identify vulnerabilities.

A user reviews data and statistical models. [analytics / analysis / tracking / monitoring / logging]

LiveAction adds new SOC-focused features to ThreatEye NDR platform

A SOC-specific user interface that supports analyst workflows and enhanced predicative threat intelligence capabilities are among the new features.

eliminate insider threats 1

Recent cases highlight need for insider threat awareness and action

Insider threats can have a devastating impact even if the harm is unintentional. Here's advice to identify and mitigate insider threat risk.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

One in 10 employees leaks sensitive company data every 6 months: report

Departing employees are most likely to leak sensitive information to competitors, criminals or the media in exchange for cash.

cyber security concept  hooded hacker

Hands-on cyberattacks jump 50%, CrowdStrike reports

Malicious hackers hone their tradecraft, reducing the time it takes to move from an initial compromised host machines to other components in enterprise networks, CrowdStrike says.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Russia-linked cyberattacks on Ukraine: A timeline

Cyber incidents are playing a central role in the Russia-Ukraine conflict. Here's how events are unfolding along with unanswered questions.

Top cybersecurity products unveiled at Black Hat 2022

Here are some of the most interesting new products launched at Black Hat USA 2022, including zero trust, extended detection and response (XDR), and a host of other threat and vulnerability management offerings.

Security system alert, warning of a cyberattack.

CrowdStrike adds AI-powered indicators of attack to Falcon platform

The new feature leverages millions of examples of malicious activity to more accurately identify signs of an attack.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

Palo Alto debuts Unit 42 team for managed detection and response

Live expert service builds on Palo Alto’s Cortex extended detection and response (XDR) platform provide, offering a managed detection and response (MDR) team for more personalized cybersecurity management and incident response.

Microsoft logo

Microsoft boosts threat intelligence with new Defender programs

Drawing from its acquisition of RiskIQ, Microsoft is releasing Defender External Attack Surface Management and Defender Threat Intelligence.

Red team  >  Double-exposure with team, cityscape + abstract data / teamwork / collaboration

11 stakeholder strategies for red team success

These best practices will help ensure a successful red team exercise by getting all the stakeholders on the same page.

22 dg 040 watch out 2022 top global cloud threats

CrowdStrike enhances container visibility and threat hunting capabilities

The cloud-native security provider wants to help customers gain visibility into all of their containers, as well as uncover a growing array of threats across multicloud environments.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Deloitte expands its managed XDR platform

New additions beef up intelligence gathering, threat hunting, and mobile device security.

eye binary IDS Intrusion Detection System

Orca adds detection and response capabilities to its agentless cloud security solution

New feature gives users full visibility into cloud environments to thwart workload and non-workload attacks.

Microsoft > Excel [Office 365]

How to manage Microsoft's Excel and Office macro blocking

Microsoft's reversal of its blocking by default on Excel macros creates an opportunity to improve policies and processes around Excel and Office macro use.

A human face emerges from an abstract virtual landscape of metallic cylinders.

Darktrace launches new PREVENT AI security products to pre-empt cyberthreats

Darktrace claims its AI-driven portfolio works together autonomously to optimize an organization’s security through a continuous feedback loop.

Load More
You Might Also Like