3 Tips for Protecting a VPN in the Face of Major Vulnerabilities
TAGS: VPN Security | VPNs | vulnerability scanning Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →
How to Choose Between Penetration Tests and Vulnerability Scans
TAGS: penetration testing | vulnerability scanning Even seasoned cybersecurity professionals confuse penetration tests with vulnerability scans. Both play an important role in the security practitioner’s toolkit, but …Continue reading →
IT and End of Life Issues
TAGS: security patches | vulnerability scanning | Windows security Organizations around the world have extremely complex technology environments that depend upon many different components to function properly. Operating systems, …Continue reading →
Vulnerability Assessments Reveal Security Weaknesses
TAGS: vulnerability management | vulnerability scanning How confident are you that your network is secure and that hackers aren’t lurking on a server, lying in wait …Continue reading →
Choose the Best Vulnerability Assessment Tools
TAGS: vulnerability management | vulnerability scanning Security vulnerabilities exist in every organization. The sheer volume of operating system, application and infrastructure security alerts announced each day …Continue reading →
Tech Tips: Running a Vulnerability Scan
TAGS: vulnerability scanning Vulnerability scanning plays a critical role in the information security program of any educational institution. Conducting regular security scans ensures …Continue reading →
Five Ways to Protect Your Network
TAGS: encryption | IDS | IPS | logging | vulnerability scanning Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →
Can open source solve PCI compliance problems?
TAGS: file integrity monitoring | log management | PCI DSS | vulnerability scanning Open source software provides organizations with a community-developed, inexpensive alternative to commercial products. Many enterprises have turned to open source …Continue reading →
What Security Vulnerabilities Should Be Fixed First?
TAGS: DLP | risk assessment | vulnerability scanning Enterprises who begin a vulnerability management program often find themselves quickly faced with an intimidating avalanche of data. Scan results …Continue reading →
Vulnerability Management In the Cloud
TAGS: MSSP | vulnerability scanning As the security industry slowly moves toward the adoption of managed security service providers (MSSPs), one particular area is gaining …Continue reading →