Top Vulnerability Management Tools: Reviews & Comparisons 2024

Top Vulnerability Management Tools: Reviews & Comparisons 2024

There are more vulnerabilities around than ever. The Verizon Data Breach Investigations Report highlighted an almost 200% growth in the exploitation of vulnerabilities in 2023. In the first seven months of 2024, new vulnerabilities rose by another 30% compared to the previous year. No wonder vulnerability management tools are becoming a staple of the enterprise cybersecurity arsenal. “Vulnerability management is a core function of cybersecurity,” said Michelle Abraham, research director, Security and Trust at IDC….

Read More

ISC2 Security Congress: The Rise in Nation-State Cyber Threats

ISC2 Security Congress: The Rise in Nation-State Cyber Threats

Today’s threat landscape includes nation-state actors as well as attackers looking to test their skills or turn a profit. AT ISC2 Security Conference in Las Vegas, CISA advisor and former New York Times cybersecurity journalist Nicole Perlroth took the stage to discuss what has changed over the last 10 years of cyber warfare. Her presentation was the capstone of the conference, held Oct. 13-16. Nation-state attackers look for ‘target-rich, cyber-poor’ victims Perlroth presented a timeline…

Read More

CrowdStrike Outage Disrupts Microsoft Systems Worldwide | TechRepublic

CrowdStrike Outage Disrupts Microsoft Systems Worldwide | TechRepublic

A major disruption to Windows PCs in the U.S., U.K., Australia, South Africa and other countries was caused by an error in a CrowdStrike update, the cloud security company announced on Friday. Emergency services, airports and law enforcement reported downtime, which is ongoing. “This is not a security incident or cyberattack,” CrowdStrike said in a statement. Blue Screen of Death widespread due to CrowdStrike outage Affected organizations saw the infamous Blue Screen of Death, the…

Read More

Snowflake Users Targeted for Data Theft and Extortion

Snowflake Users Targeted for Data Theft and Extortion

A new report from Mandiant, part of Google Cloud, reveals that a financially motivated threat actor named UNC5537 collected and exfiltrated data from about 165 organizations’ Snowflake customer instances. Snowflake is a cloud data platform used for storing and analyzing large volumes of data. The threat actor managed to get access to these data by triggering credentials that were previously stolen by infostealer malware or purchased from other cybercriminals. According to Mandiant, the threat actor…

Read More

Crowdstrike vs Trellix (2024): What Are The Main Differences?

Crowdstrike vs Trellix (2024): What Are The Main Differences?

Security threats are a major concern for businesses, as they can have a number of undesirable consequences, including customer data breaches or loss of sensitive data. To protect against these threats, many businesses are turning to endpoint detection and response, or EDR, software. SEE: 10 Myths about Cybersecurity You Shouldn’t Believe (TechRepublic Premium) CrowdStrike and Trellix are two of the top EDR software options on the market. Both tools are adept at identifying and mitigating…

Read More

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

Highlights from CrowdStrike’s 2024 report: Identity-based and social engineering attacks still take center stage. Cloud-environment intrusions have increased by 75% from 2022 to 2023. Third-party relationships exploitation makes it easier for attackers to hit hundreds of targets. CrowdStrike added 34 new threat actors in 2023. Attackers are compromising networks at a faster rate. Attackers are targeting periphery networks. CrowdStrike’s new 2024 Global Threat report exposed the latest trends in cyberattacks, and we’re highlighting the main…

Read More

Proofpoint to Buy Deception Firm Illusive, Boost Offerings

Proofpoint to Buy Deception Firm Illusive, Boost Offerings

Active Defense & Deception , Next-Generation Technologies & Secure Development Ashan Willy’s First Deal as CEO Gets Proofpoint Into the Identity, Deception Spaces Michael Novinson (MichaelNovinson) • December 12, 2022     Ashan Willy has made his first acquisition as Proofpoint’s CEO, scooping up an identity startup established by Check Point’s former cloud and document security leader. See Also: Finding a Password Management Solution for Your Enterprise The Silicon Valley-based email security vendor says…

Read More

2022 Predictions for Healthcare Cybersecurity | Healthcare IT Today

2022 Predictions for Healthcare Cybersecurity | Healthcare IT Today

As we head into 2022, we asked the Healthcare IT Today community to share some predictions for the new year.  I always find it interesting to learn what people think is coming down the road.  Be sure to check out all our Health IT Predictions. There’s no topic in health IT that keeps healthcare CIOs more than security.  It’s likely one of the most challenging problems any CIO faces.  Plus, if they do a great…

Read More