Cloud and remote work have not only revolutionized the way business is done, but they have irrevocably changed attack surfaces. Assets move, change and appear constantly, and this dynamic nature means traditional manual asset inventory processes simply cannot keep up.
The modern attack surface requires modern,...
Recently, threat actors exposed and exploited multiple vulnerabilities in Ivanti's connect secure.
In this webinar, C-level experts will examine the fallout from the publication of two critical Ivanti vulnerabilities, shedding light on their potential impact and the urgency for proactive risk mitigation.
Join...
Discover how to bridge the gap between perception and reality in cybersecurity asset management.
Learn key strategies for:
Owning the Asset Inventory: Security teams must take control of asset inventory to ensure comprehensive visibility and protection.
Adopting Continuous Real-time Inventory:...
Research from Accenture finds three-quarters (74%) of CEOs are concerned about their organizations’ ability to avert or minimize damage to the business from a cyberattack—despite the fact that 96% of CEOs said that cybersecurity is critical to organizational growth and stability.
Whether your IR team is part of...
In today's interconnected digital landscape, managing your exposure strategy for your infrastructure and your supply chain is paramount. This interview discusses strategies to fortify cybersecurity defenses and minimize risks.
Cloud and remote work have not only revolutionized the way business is done, but they have irrevocably changed attack surfaces. Assets move, change and appear constantly, and this dynamic nature means traditional manual asset inventory processes simply cannot keep up.
The modern attack surface requires modern,...
Supply chain security firm Eclypsium found corporate VPN maker Ivanti's Pulse Secure devices - which underwent much emergency patching amid a likely Chinese espionage zero-day hacking campaign - operate on an 11-year old version of Linux and use many obsolete software packages.
In the rapidly evolving landscape of cybersecurity, the concept of attack surface management (ASM) has become increasingly crucial. While the prevalence and dynamism of these surfaces have surged, many organizations still rely on outdated manual processes, leaving them vulnerable to cyber threats. .
Read this white...
Venture-capital owned Armis, a firm that touts its ability to prepare companies for attacks before they materialize, acquired cybersecurity startup CTCI in a transaction approaching $20 million. Armis will merge CTCI employees and technology over the next 30 days.
As the cybersecurity landscape continues to grapple with escalating threats, transitioning from reactive to proactive defense becomes paramount. Embracing the realm of CyberSec testing, this approach goes beyond conventional security validation. Discover the power of dynamic testing environments that simulate...
Today’s threat landscape is more pervasive and autonomous threats than ever. It’s not a matter of if or even when an attack happens, but how often and to what degree. Security leaders are under immense pressure to prove that they can ensure business continuity in the event of an attack.
Join this session as we...
Software developers are in a race against time to patch a flaw that could result in supply chain attacks, warned the integrated development environment maker JetBrains, which on Monday released an urgent patch for an authentication bypass flaw in its CI/CD TeamCity product.
When analyzing huge number of malware samples, one would want to receive malware configurations in a well-defined, predictable, industry-standard format that can be easily integrated into a security system.
After researching an abundance of options, this report concluded on using the output format defined by the US...
Indiscriminate attacks by threat actors means every business should be actively working to detect and respond. However, with continuous testing, security teams can take a proactive approach to reduce the time it takes to discover newly created gaps and allow teams to act on them before they are exploited. Using...
A security vulnerability in Fortra's GoAnywhere managed file transfer software can allow unauthorized users to create a new admin user. The vulnerability is a remotely exploitable authentication bypass flaw. Hackers have targeted file transfer software over the past year, including GoAnywhere MFT.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.