Vulnerability management metrics: How to measure success

Without the right metrics, vulnerability management is pretty pointless. If you’re not measuring, how do you know it’s working? So how do you know what to focus on? The... Read more »

The hidden costs of data breaches for small businesses

Nearly 8 in 10 small business leaders admit they are anxious about the safety of their company’s sensitive data and information, according to Shred-it. According to the Identity Theft... Read more »

F5 fixes critical BIG-IP vulnerability (CVE-2023-46747)

F5 Networks has released hotfixes for three vulnerabilities affecting its BIG-IP multi-purpose networking devices/modules, including a critical authentication bypass vulnerability (CVE-2023-46747) that could lead to unauthenticated remote code execution... Read more »

Immuta Discover identifies and classifies sensitive data

Immuta released Immuta Discover, a new product for automated tagging and classification on cloud data platforms. Immuta Discover enables data teams to establish and maintain highly accurate metadata for... Read more »

Netwrix releases product enhancements to strengthen data security

Netwrix has released new versions of eight products since March 2023. The enhancements further help customers reduce the risk of breaches and limit the impact of attacks by empowering... Read more »

White House issues Executive Order for safe, secure, and trustworthy AI

President Biden issued a landmark Executive Order to ensure that America leads the way in seizing the promise and managing the risks of artificial intelligence (AI). New standards for... Read more »

Citrix Bleed: Mass exploitation in progress (CVE-2023-4966)

CVE-2023-4966, aka “Citrix Bleed”, a critical information disclosure vulnerability affecting Citrix NetScaler ADC/Gateway devices, is being massively exploited by threat actors. According to security researcher Kevin Beaumont’s cybersecurity industry... Read more »

Logging Made Easy: Free log management solution from CISA

CISA launched a new version of Logging Made Easy (LME), a straightforward log management solution for Windows-based devices that can be downloaded and self-installed for free. CISA’s version reimagines... Read more »

Google expands bug bounty program to cover AI-related threats

Google has expanded its bug bounty program, aka Vulnerability Rewards Program (VRP), to cover threats that could arise from Google’s generative AI systems. Google’s AI bug bounty program Following... Read more »

The dangers of dual ransomware attacks

At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This... Read more »
Subscribe to our Newsletter