Misconfigurations drive 80% of security exposures

Misconfigurations drive 80% of security exposures

A report from XM Cyber analyzes more than 40 million exposures in order to provide a thorough understanding of the current exposure landscape. The report found that 80% of exposures are caused by identity and credential misconfigurations. Out of these exposures, one-third of them put critical assets at risk of a breach. According to the report, a majority of the exposure is within an organization’s active directory, a critical component for connecting users to network…

Read More

Benefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability Management

Benefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability Management

Co-authored by Tejas Sheth, Sr. Security Specialist, Amazon Web Services – AISPL. Risk-based Vulnerability Management (RBVM) represents a strategic approach to cyber security that focuses on identifying and prioritizing vulnerabilities based on the potential risk they pose to an organization. This approach builds upon traditional vulnerability management, which often involves scanning for and patching all vulnerabilities without considering their actual impact on the business. In RBVM, vulnerabilities are evaluated based on factors like the criticality…

Read More

Enhanced Cybersecurity with Cisco Secure Endpoint and Vulnerability Management

Enhanced Cybersecurity with Cisco Secure Endpoint and Vulnerability Management

Organizations these days face the daunting challenge of effectively prioritizing and responding to security risks and incidents. The combination of Cisco Secure Endpoint and Cisco Vulnerability Management form a powerful automated solution, enabling you to detect, prioritize and manage endpoint vulnerabilities, beginning with the most severe ones. There are two integrations available to help address critical aspects of security, both pre- and post-incident, which not only enhance incident response, but also fortify preventative measures. Post-Incident:…

Read More

Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management   

Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management   

Protecting your organization against cyber threats is a top priority. It’s no secret that data breaches and security vulnerabilities can wreak havoc on businesses. The key to safeguarding your organization? Understanding your risk landscape and taking proactive measures to protect your assets. In this blog post, we’ll dive into Cisco Vulnerability Management’s ability to ingest asset, vulnerability, and fix data from third-party security tools, providing you with a centralized view of risk for effective prioritization…

Read More

Cisco Vulnerability Management Named a Leader in Omdia Universe: RBVM Solutions, 2023

Cisco Vulnerability Management Named a Leader in Omdia Universe: RBVM Solutions, 2023

Omdia released its 2023 Omdia Universe: Risk-Based Vulnerability Management Solutions report, and we’re excited to say that Cisco Vulnerability Management (formerly Kenna.VM) is recognized as a Leader! Risk-based Vulnerability Management (RBVM) builds upon the legacy vulnerability management market with stronger vulnerability prioritization and response. RBVM tackles the problem of determining which vulnerabilities pose a real risk in your environment and need to be patched versus which vulnerabilities you can safely de-prioritize. Improving the efficiency and…

Read More

Vulnerabilities on external attack surfaces live far too long

Vulnerabilities on external attack surfaces live far too long

Vulnerabilities on external attack surfaces live far too long | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

VERT Threat Alert: August 2023 Patch Tuesday Analysis

VERT Threat Alert: August 2023 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s August 2023 Security Updates, which includes a recently introduced release notes format. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1068 on Wednesday, August 9th. In-The-Wild & Disclosed CVEs CVE-2023-38180 A vulnerability in Kestrel could allow for a denial of service. Kestrel is the cross-platform web server that is included with (and enabled by default in) ASP.NET Core. When detecting a potentially malicious client, Kestrel…

Read More

VERT Threat Alert: July 2023 Patch Tuesday Analysis

VERT Threat Alert: July 2023 Patch Tuesday Analysis

Tag CVE Count CVEs Windows Image Acquisition 1 CVE-2023-35342 Windows Netlogon 1 CVE-2023-21526 Microsoft Power Apps 1 CVE-2023-32052 Windows Remote Desktop 3 CVE-2023-32043, CVE-2023-35332, CVE-2023-35352 Windows Error Reporting 1 CVE-2023-36874 Windows PGM 1 CVE-2023-35297 Windows CryptoAPI 1 CVE-2023-35339 Windows Cryptographic Services 1 CVE-2023-33174 Windows Installer 2 CVE-2023-32050, CVE-2023-32053 Windows CDP User Components 1 CVE-2023-35326 Windows Transaction Manager 1 CVE-2023-35328 Windows Admin Center 1 CVE-2023-29347 Windows Authentication Methods 1 CVE-2023-35329 Windows Server Update Service 2 CVE-2023-35317,…

Read More

VERT Threat Alert: June 2023 Patch Tuesday Analysis

VERT Threat Alert: June 2023 Patch Tuesday Analysis

Tag CVE Count CVEs Windows Installer 1 CVE-2023-32016 Windows Hyper-V 1 CVE-2023-32013 Microsoft Power Apps 1 CVE-2023-32024 Windows Group Policy 1 CVE-2023-29351 Remote Desktop Client 2 CVE-2023-29352, CVE-2023-29362 Visual Studio 9 CVE-2023-33139, CVE-2023-29012, CVE-2023-29011, CVE-2023-25815, CVE-2023-29007, CVE-2023-25652, CVE-2023-27909, CVE-2023-27910, CVE-2023-27911 Microsoft Dynamics 1 CVE-2023-24896 Microsoft Office Outlook 1 CVE-2023-33131 Windows Hello 1 CVE-2023-32018 Windows Collaborative Translation Framework 1 CVE-2023-32009 Microsoft Office SharePoint 5 CVE-2023-29357, CVE-2023-33129, CVE-2023-33130, CVE-2023-33132, CVE-2023-33142 Windows PGM 3 CVE-2023-29363, CVE-2023-32014, CVE-2023-32015 Microsoft…

Read More

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2 3