Proofpoint records 100,000 phone-based attacks each day
Daily Archives: June 7, 2022
6 top vulnerability management tools and how they help prioritize threats
Not only has vulnerability management changed considerably over the years, but so have the systems on which enterprise security teams must identify and patch. Today there are systems on-premises, IoT devices, public and private clouds, and substantially more custom applications. No more do vulnerability management systems just focus on networks and private hosted applications. Today, they must be able to assess all of these systems and identify the vulnerabilities and help enterprise security teams make better remediation decisions.
For vulnerabilities to be dangerous, they have to be exploitable. A vulnerability on a system that can’t be exploited isn’t much of a danger. Knowing what is truly dangerous is essential so enterprises can plan what to fix immediately and what can be patched or mitigated later.
Social Care Organizations Get Cybersecurity Boost
Cyber-Attack Surface “Spiralling Out of Control”
#RSAC: The Changing Work of the Cyber-Threat Intelligence Community
The need for new approaches to improve cyber-threat intelligence was highlighted during a keynote at the RSA conference