Por fin encontrará las 'incógnitas desconocidas' a lo largo de toda su superficie de ataque
Los CISO temen a las “incógnitas desconocidas”: los activos, las vulnerabilidades, las configuraciones erróneas y las debilidades del sistema que el equipo de seguridad no ha detectado y, por lo tanto, no ha neutralizado. These blind spots represent a golden opportunity for attackers – and a major security risk for organizations....
Instantánea de ciberseguridad: Seis cosas que importan ahora
Topics that are top of mind for the week ending Sept. 16 | How cybersecurity excellence boosts business | CISOs on a vendor-consolidation campaign | A quick check on converged OT/IT cybersecurity | Guides to help developers beef up on security | And much more!...
AA22-257A: Cybersecurity Agencies Issue Joint Advisory on Iranian Islamic Revolutionary Guard Corps-Affiliated Attacks
Several global cybersecurity agencies publish a joint advisory detailing efforts by Iranian-government sponsored threat actors exploiting vulnerabilities to enable ransomware attacks....
CVE-2022-40139: Vulnerability in Trend Micro Apex One Exploited in the Wild
Trend Micro has patched six vulnerabilities in its Apex One on-prem and software-as-a-service products, one of which has been exploited in the wild....
IDSA Introduces CIEM Best Practices
The Identity Defined Security Alliance recently announced their list of best practices for cloud infrastructure entitlement management....
Microsoft’s September 2022 Patch Tuesday Addresses 62 CVEs (CVE-2022-37969)
Microsoft addresses 62 CVEs in its September 2022 Patch Tuesday release, including five critical flaws....
Ajuste de evaluaciones de red para rendimiento y uso de recursos
Using the correct tool for the job and optimizing scanner placement will have a large impact on scan efficiency with Nessus, Tenable.io and Tenable.sc....
Instantánea de ciberseguridad: Seis cosas que importan ahora
Topics that are top of mind for the week ending Sept. 9 | Software supply chain security in the spotlight. Guidance for evaluating IoT security tools. Increasing diversity in cybersecurity. Another look at the major cloud security threats. And much more!...
IT/OT Convergence: Now Is the Time to Act
Presidential advisory committee provides recommendations to improve critical infrastructure security....
96% Could Have Prevented Their Identity Breach – IDSA
Identity-related breaches are on the rise but security and IAM pros are not idle. Learn from this survey how they are staving off the next attack....
La visibilidad completa de TI necesita el contexto del riesgo para el negocio
Contar con una comprensión completa, detallada y continuamente actualizada de todos los activos de TI es uno de los santos griales de los equipos de seguridad. To achieve it, we must first understand what “visibility” truly entails, how it’s more than just identifying what’s out there and knowing which challenges must be addressed....
Instantánea de ciberseguridad: Seis cosas que importan ahora
Topics that are top of mind for the week ending Sept. 2 | Shift-left efforts falling short. What CISOs earn and what stresses them out. The quantum computing risk for critical infrastructure. Securing machine learning systems. And much more!...