Avoid high cyber insurance costs by improving Active Directory security

March 19, 2024 at 10:36AM Organizations face rising cyber insurance rates due to remote work expansion, increased cyberattacks, more claims, and higher ransomware payouts. Active Directory security plays a crucial role in insurers’ risk assessment, focusing on security audits, password control, access management, patch updates, and privileged account protection. Implementing robust Active Directory security measures … Read more

CTEM 101 – Go Beyond Vulnerability Management with Continuous Threat Exposure Management

March 12, 2024 at 07:27AM Organizations are increasingly considering establishing a Continuous Threat Exposure Management (CTEM) program to reduce cyber risk. The CTEM approach combines attack simulation, risk prioritization, and remediation guidance to identify and address the most urgent risks and vulnerabilities. CTEM offers advantages over alternative approaches, covering all assets and continuously discovering all … Read more

NIST Cybersecurity Framework 2.0: 4 Steps To Get Started

March 1, 2024 at 02:33PM The latest draft of the NIST Cybersecurity Framework introduces significant changes, including a new “Govern” function and expanded best practices. Organizations must assess the impact on their cybersecurity programs and consider factors such as supply chain security. Utilizing NIST resources, discussing the “Govern” function with leadership, and re-evaluating vendor support … Read more

Tenable Introduces Visibility Across IT, OT, and IoT Domains

February 29, 2024 at 04:46PM Tenable® released Tenable One for OT/IoT, the first exposure management platform offering comprehensive visibility into assets across IT, operational technology (OT), and IoT environments. This solution aims to address the increasing cyber attack surface due to interconnected assets, providing actionable risk intelligence to mitigate operational risks and prioritize security measures. … Read more

Over 13,000 Ivanti gateways vulnerable to actively exploited bugs

February 15, 2024 at 10:33AM Thousands of Ivanti Connect Secure and Policy Secure endpoints remain vulnerable to multiple high to critical security issues. The flaws include authentication bypass, server-side-request forgery, arbitrary command execution, and command injection problems. Despite available security updates, a large number of endpoints are still exposed to these vulnerabilities, increasing the risk … Read more

UAE Banks Conduct Cyber War Games Exercise

February 7, 2024 at 10:08AM UAE banks recently participated in a cyberattack simulation to test their ability to combat cyber risks. The Cyber Wargaming event was organized by the Central Bank of the UAE, the UAE Government’s Cyber Security Council, and the UAE Banks Federation. Representatives from various sectors attended, reflecting the UBF’s commitment to … Read more

As Smart Cities Expand, so Do the Threats

February 7, 2024 at 08:19AM Technologists stress the urgency of building smart cities due to the growing urban population, putting pressure on infrastructure and technology. However, securing these interconnected systems is a significant challenge, as each technology needs to be adequately secured and the convergence, interoperability, and integration of devices pose new risks. Cybersecurity expertise … Read more

IONIX ​​Completes $42M Financing Round to Expand Threat Exposure Management Across the Entire Attack Surface

February 6, 2024 at 05:32PM IONIX has completed its $42 million A Round financing, including $15 million from new investor Maor Investments, expanding its total funding to $50.3 million. The funding will be used to accelerate market activities, develop product roadmap, and enhance Threat Exposure Management capabilities. Cyber veteran Chad Kinzelberg joins the board to … Read more

Why the Right Metrics Matter When it Comes to Vulnerability Management

February 4, 2024 at 12:19PM The article emphasizes the importance of measuring the effectiveness of vulnerability management programs using the right metrics and analytics. It highlights key metrics to track, such as scan coverage, average time to fix, risk score, issues, and attack surface monitoring. Proper measurement enables informed decision-making, resource allocation, and improved security … Read more

Black Kite Unveils Monthly Ransomware Dashboards

January 26, 2024 at 05:05PM Black Kite unveiled the first monthly ransomware dashboard, offering insights on ransomware groups, victims, and attack patterns. December’s research revealed common compromise indicators and the emergence of the WereWolves ransomware group targeting U.S., Europe, and Russia. The dashboard also highlighted industry-specific cyber-risks and evolving tactics of ransomware groups for informed … Read more