Want to Grow Vulnerability Management into Exposure Management? Start Here!

December 5, 2024 at 07:24AM Vulnerability Management (VM) is becoming inadequate as cybersecurity challenges evolve, necessitating a shift to Exposure Management (EM). By incorporating business context, organizations can prioritize risks, optimize resources, and align security with strategic goals. Effective metrics can engage leadership and transition cybersecurity from a cost center to a business enabler. ### … Read more

Microsoft Highlights Security Exposure Management at Ignite

November 22, 2024 at 08:43AM Microsoft has launched its Security Exposure Management offering, adding continuous threat exposure management (CTEM) to its security portfolio. This proactive approach aims to reduce breaches and improve vulnerability detection. It integrates with Microsoft 365 licenses, supports third-party tools, and provides a comprehensive view of organizational security postures. ### Meeting Takeaways … Read more

Check Point to Acquire External Cyber Risk Management Firm Cyberint

August 28, 2024 at 08:49AM Check Point Software Technologies, a cybersecurity firm, has agreed to acquire Cyberint Technologies for an estimated $200 million, combining threat intelligence with attack surface reconnaissance to enhance security operations. Cyberint’s platform, utilizing dark web data harvesting and continuous testing, will integrate into Check Point’s Infinity Platform to offer comprehensive security … Read more

Complete Guide to Protecting Seven Attack Vectors

August 27, 2024 at 11:25AM Jon Clay reviews seven key initial attack vectors and provides proactive security tips to reduce cyber risk across the attack surface amid the rapid expansion of the digital attack surface due to digital transformation and remote work. The vectors include email, web and web applications, vulnerabilities, devices, island hopping, insider … Read more

How to identify unknown assets while pen testing

August 27, 2024 at 10:19AM External Attack Surface Management (EASM) bridges gaps in traditional penetration testing, addressing overlooked risks in an organization’s digital defenses. An Informa Tech survey highlights limited coverage and frequency issues of penetration testing, leaving organizations vulnerable to cyber threats. Integrating EASM with Penetration Testing as a Service (PTaaS) provides comprehensive visibility … Read more

Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System Control

August 22, 2024 at 12:18PM A China-nexus threat group, Velvet Ant, exploited a recently patched security flaw in Cisco switches as a zero-day, enabling extensive system control and evasion of detection. This involved weaponizing CVE-2024-20399 to deliver bespoke malware, facilitate data exfiltration, and establish persistent access. The attackers’ sophisticated tactics and use of open-source tools … Read more

SaaS Apps Present an Abbreviated Kill Chain for Attackers

August 8, 2024 at 09:06AM Security researchers at Black Hat USA 2024 highlighted the evolving threat landscape for organizations due to the expanded use of SaaS applications. They revealed that attackers are leveraging valid credentials to breach SaaS environments, bypassing traditional cyber kill chain steps. It’s crucial for security teams to reassess defenses and implement … Read more

Linx Security Launches With Identity Management Platform

July 23, 2024 at 07:39AM Linx Security, a Tel Aviv-based startup, addresses identity management challenges by utilizing AI and analytics. The technology maps an organization’s environment to identify all accounts and manage user access permissions. The platform aims to reduce the attack surface, ensure compliance, and streamline operations. Linx has received $27 million in Series … Read more

Asset Management Holds the Key to Enterprise Defense

June 13, 2024 at 08:26AM Security professionals emphasize the importance of comprehensive asset management to maintain organizational security. Challenges in obtaining accurate asset inventory have increased due to the complexity and scale of modern networks. Experts stress the need for efforts to identify and manage business-technology assets effectively, as poor visibility can lead to security … Read more

runZero Research Explores Unexpected Exposures in Enterprise Infrastructure

May 8, 2024 at 05:26PM runZero unveiled the inaugural runZero Research Report at the RSA Conference, highlighting alarming trends in enterprise asset security. Key findings include the convergence of IT and OT, limited visibility into network devices, and risks associated with end-of-life hardware and operating systems. The report emphasizes the significance of asset discovery for … Read more