Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.
|
|
This tool will help you systematically understand your current security state. This tool will show your perceived and actual level and your most and least mature security...
|
|
This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you make your case to the board and develop a roadmap for your prioritized...
|
|
A leaked UN report showed that servers were compromised during a cyberattack that exploited an older version of Microsoft SharePoint. This breach is a case study in the...
|
|
Reported by Microsoft on January 17, the company admitted to another vulnerability in the older versions of its Windows products. A vulnerability in the remote code...
|
|
Last fall, Microsoft announced that it would be ending support for Windows 7 on January 14, 2020.
|
|
A Citrix vulnerability first discovered on December 17, 2019 is being continually exploited by ransomware attackers despite patching attempts by Citrix.
|
|
Project Zero is changing its vulnerability disclosure policy to give software developers more time to patch vulnerabilities. The policy is now shifted to a stringent...
|
|
Cybersecurity firm Bishop Fox identified eight vulnerabilities in ConnectWise’s remote control and remote access software.
|
|
Palo Alto Networks has acquired Aporeto, a machine-identity-based microsegmentation company, for $150 million. As Palo Alto seeks to solidify itself as a cloud-centric...
|
|