CVE-2022-40139: Vulnerability in Trend Micro Apex One Exploited in the Wild
September 14, 2022Trend Micro has patched six vulnerabilities in its Apex One on-prem and software-as-a-service products, one of which has been exploited in the wild.
IDSA Introduces CIEM Best Practices
September 14, 2022The Identity Defined Security Alliance recently announced their list of best practices for cloud infrastructure entitlement management.
Microsoft’s September 2022 Patch Tuesday Addresses 62 CVEs (CVE-2022-37969)
September 13, 2022Microsoft addresses 62 CVEs in its September 2022 Patch Tuesday release, including five critical flaws.
Tuning Network Assessments for Performance and Resource Usage
September 13, 2022Using the correct tool for the job and optimizing scanner placement will have a large impact on scan efficiency with Nessus, Tenable.io and Tenable.sc.
Cybersecurity Snapshot: 6 Things That Matter Right Now
September 9, 2022Topics that are top of mind for the week ending Sept. 9 | Software supply chain security in the spotlight. Guidance for evaluating IoT security tools. Increasing diversity in cybersecurity. Another look at the major cloud security threats. And much more!
IT/OT Convergence: Now Is the Time to Act
September 8, 2022Presidential advisory committee provides recommendations to improve critical infrastructure security.
96% Could Have Prevented Their Identity Breach – IDSA
September 7, 2022Identity-related breaches are on the rise but security and IAM pros are not idle. Learn from this survey how they are staving off the next attack.
Full IT Visibility Requires Business Risk Context
September 7, 2022Having a full, continuously updated and detailed understanding of all IT assets is one of the holy grails for security teams. To achieve it, we must first understand what “visibility” truly entails, how it’s more than just identifying what’s out there and knowing which challenges must be addressed.
Cybersecurity Snapshot: 6 Things That Matter Right Now
September 2, 2022Topics that are top of mind for the week ending Sept. 2 | Shift-left efforts falling short. What CISOs earn and what stresses them out. The quantum computing risk for critical infrastructure. Securing machine learning systems. And much more!
Taking Notice of AWS IAM Roles Anywhere
August 30, 2022IAM Roles Anywhere may be a pivotal moment for security — the new service lets you enrich the arsenal of tools at your disposal to improve your AWS security posture.
Cybersecurity Snapshot: 6 Things That Matter Right Now
August 26, 2022Topics that are top of mind for the week ending Aug. 26 | The “platformization” of hybrid cloud security. Budgeting guidance for CISOs. Tackling IT/OT cybersecurity challenges. Tips for complying with HIPAA’s cybersecurity rule. A roundup of patches, trends and incidents to keep an eye on. And much more!
DevSecOps: An Organizational Fix for Improving Cloud Security – Friction-free
August 24, 2022By implementing the DevSecOps culture, tools and training, you’ll be on your way to more shift-left security and less organizational friction. Here’s how.