Determining the 10 most critical vulnerabilities on your network

Determining the 10 most critical vulnerabilities on your network

When it comes to staying on top of security events, a good application that alerts on security events is better than none. It stands to reason then that two would be better than one, and so on. More data can be a double-edged sword. You want to know when events happen across different systems and through disparate vectors. However alert fatigue is a real thing, so quality over quantity matters. The real power of having…

Read More

The myth of the long-tail vulnerability

The myth of the long-tail vulnerability

Modern-day vulnerability management tends to follow a straightforward procedure. From a high level, this can be summed up in the following steps: Identify the vulnerabilities in your environment Prioritize which vulnerabilities to address Remediate the vulnerabilities When high-profile vulnerabilities are disclosed, they tend to be prioritized due to concerns that your organization will be hammered with exploit attempts. The general impression is that this malicious activity is highest shortly after disclosure, then decreases as workarounds…

Read More

How to prioritize patching in the exploit storm

How to prioritize patching in the exploit storm

How to prioritize patching in the exploit storm | 2021-05-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More