Blog

Blog

Threat Intelligence Fostering Modern Vulnerability Management Platforms

Corporate and personal decisions are an important part of our daily life; many times they are made from our previous knowledge and lessons learned from similar events. To make a truly educated decision, the most complete information available is needed to quantify risks and estimate the potential returns of our actions.Unfortunately we don’t always have the answers to life’s unexpected challenges,...
Blog

Saltstack RCE and vBulletin "incorrect access control" Vulnerabilities

Saltstack Remote Code Execution (RCE) Vulnerability For those that have implemented SaltStack in your cloud environment, please be aware of several vulnerabilities (CVE-2020-11651/CVE-2020-11652) that together allow a RCE condition, which could allow an attacker to take over your Master Salt server and then laterally move to your Salt minions. Please consider patching with release 3000.2 or...
Blog

Data at rest versus data at creation: It’s not a choice you should make – secure them both

As part of your defense against an external cyberattack, you’re ready to tackle the enormous task of securing all the data sitting on your servers, desktops and external drives.If you’re like most organizations, you’ve got tons of it because no one throws anything away these days. And if you’re working at an enterprise, it’s an exponentially larger...
Blog

Insider Behind $1 Billion Trade Secret Theft Case Sentenced

An ex-employee of a petroleum giant who previously plead guilty to taking a billion-dollar trade secret has been sentenced to 24 months in a federal prison and ordered to pay $150,000 in restitution.Following his release, he’ll be deported, the Federal Bureau of Investigation (FBI) confirmed this week.Hongjin Tan, the employee in question, is a Chinese national who formerly worked as an associate...
Blog

How to Use SAST and DAST to Meet ISA/IEC 62443 Compliance

In a recent cyber-attack, a metallurgy company became infected with ransomware. The firm shut down for a week to deal with the infection; the final costs for the system backup and production downtime came to over 50 million euros ($54 million). This follows a Kaspersky report, “The State of Industrial Cybersecurity” that shows 70% of companies expect an attack on their Operational Technology/...
Blog

Threat Landscape: Shining a Light on Truly Critical Vulnerabilities

Intelligence-Driven Vulnerability ManagementResource-strapped IT departments need to prioritize vulnerabilities and threats that will have the most impact within their organization's environment. Many businesses rely on common vulnerability and severity metrics (CVE, CVSS, CWE, etc.) to prioritize vulnerabilities that need attention. Attackers, on the other hand, don't necessarily prioritize their...
Blog

Better Enterprise Security Through Forced Quarantine

This article was originally published on TechAeris on May 08, 2020.What do you do if a small infected minority is threatening to infect the rest? By now, there probably isn’t a human being on the planet that doesn’t know the answer to this question: you place the infected in quarantine, separating them from the healthy. Collectively, throughout the world, we are distancing ourselves from the...
Blog

Why Ignoring Web Application Security Can Be Costly

It’s easy to forget how dramatically the delivery of tech tools has changed over the decades. These days, few of us depend on a long list of desktop apps to do our work. Instead, we spend our working day logged into several web apps - simultaneously.Likewise, we can miss just how complex and interconnected the web app ecosystem is. Think you’re just using a single web app provided by a single...
Blog

Security GPA®: Making the Grade with Risk-Based Prioritization

Security GPA is one the most-used, and most-loved features in Fortra Vulnerability Management platform. Designed for risk prioritization, Security GPA is predicated upon a simple metric that resonates across all levels of an organization. Based on the academic grading system that uses both a four-point numerical scale in tandem with the letter grades A-F, Security GPA has grown into a powerful and...
Blog

3 Ways Peer Insight Illustrates Cybersecurity Performance

Cybersecurity is now a business requirement for most organizations. However, it’s often difficult to report on your security team’s performance to non-technical stakeholders and leadership. Senior leaders deal with conflicting priorities across the entire business. Therefore, it’s crucial to communicate the risks to your organization in a way that resonates.Vulnerability management is one of the...
Blog

Top 10 Tips to Improve Web Application Security

Web applications are exposed. Unlike internal network applications, everyone can get to a web application; all they need is an internet connection. That includes hackers too. In fact, an automated tool may be attacking the web applications you depend on as you read this article.But developers often overlook web application security. Teams frequently spend all their energy on the code, the visual...
Blog

Resources, Budget Remain An Issue for DPOs

In a recent survey, data protection officers cited a lack of budget and cohesion across all business units when it comes to developing an organization-wide data protection and privacy strategy as some of the role's top challenges.