The U.S. Department of Justice has revised its policy on who it charges with violations under the Computer Fraud and Abuse Act. The DOJ now specifies that good-faith security research and researchers cannot be charged under the CFAA because they help improve cybersecurity standards.
An emergency directive from the U.S. Cybersecurity and Infrastructure Security Agency advises all federal agencies in the country to immediately patch and address two vulnerabilities - one with a critical CVSS score and the other with a high score - that affect at least five VMware products.
Across industrial sectors, limited asset visibility, reliance on manual processes and siloed data are three common factors that make it hard to effectively protect OT operations and streamline IT and OT vulnerability management & response.
In this live webinar, you'll get guidance from subject matter experts on...
The Five Eyes intelligence alliance has released a set of the 15 most routinely exploited vulnerabilities in the past year. Nine of the 15 vulnerabilities allow remote code execution, and the rest include privilege escalation, security bypass and path traversal, among other flaws.
Join this webinar to learn how Tanium can help you achieve and maintain a comprehensive view of risk across your environment as well as the tools necessary to manage that risk in real-time and at scale. In today’s distributed environment where new threat vectors and vulnerabilities emerge daily, it’s no longer...
As a security leader, you know that the way to align your vulnerability management program to support the business is to mitigate the vulnerabilities that have the biggest business impact. But that’s easier said than done. How do you discover and rate each vulnerability? How do you remediate them without disrupting...
Industrial organizations dealt with significant challenges in 2021. Cyberattacks on the Oldsmar, Florida water facility, Colonial Pipeline, and JBS, as well as the SolarWinds supply chain attack, propelled industrial cybersecurity to the national and global stage. Millions of people have woken up to the staggering...
New Cobalt CEO Chris Manton-Jones plans to push upmarket and go after enterprise customers and leverage automation and self-service to accelerate product growth. He replaces founder Jacob Hansen, who had served as CEO since Cobalt's inception in 2013 and will remain with the firm as a board member.
Claroty’s Biannual ICS Risk & Vulnerability Report offers a comprehensive look at industrial control system (ICS) vulnerabilities publicly disclosed during the second half of 2021, including those found by Team82 and those found by affected vendors, independent security researchers, and experts inside other...
Penetration tests are essential for strengthening security and improving compliance. But common pitfalls can cost you in terms of quality, project delays or unnecessary expense.
Whether you’ve conducted many pen tests or are about to embark on your first, this eBook contains helpful guidance for companies at...
While vulnerabilities classified as ‘low risk’ may seem innocuous, they can cause just as much – if not more – damage than high-profile, emerging threats trending in news headlines. The challenge is not only finding these exposures but also prioritizing those most likely to impact your business.
Download...
Attack Surface Management is a relatively new category which fills a gap between vulnerability management tools and penetration testing. These solutions are valuable for identifying and addressing exposures before attackers can find them – but are they right for your organization?
Download the report to find out...
Cybersecurity is an ongoing battle. Thankfully, there’s no shortage of effective solutions to help protect your organization but determining which best meet your needs can be overwhelming. When evaluating your next offensive security solution, this interactive checklist from Bishop Fox can help.
This...
Antiquated legacy penetration testing methods fail to catch all the critical vulnerabilities that exist within a company’s environment, which puts organizations at risk. Security teams are moving away from traditional pentesting methods to more innovative and continuous solutions. Learn more about the challenges and...
Penetration testing isn’t a new security technique, it’s been around for years. However, many businesses aren’t utilizing this key security test. Organizations may not fully understand the level of risk assessment, the ROI, or what to expect when Penetration Testing.
This guide from Digital Defense, by...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.