Security Solution


Integrate Everywhere with Tenable.io

Integrate Everywhere with Tenable.io

Successful vulnerability management (VM) programs aren’t isolated programs. Successful ones include active participants from multiple teams who can share data and results with each other, so that everyone benefits from greater visibility, automation and control. And while in the past VM providers haven’t made their products easy to integrate with, that changes with Tenable.io™. We designed Tenable.io to be the most open VM solution, with...

Read More


New Symantec Protection Engine 8.2 Enhancements

New Symantec Protection Engine 8.2 Enhancements

Symantec Enterprise Customers get Enhanced Security, Manageability and Protection Symantec, a division of Broadcom (NASDAQ: AVGO), is rolling out new storage threat detection help for enterprise customers – and not a moment too soon. That’s because the explosion of cloud services and related storage attracted the attention of threat actors looking to pounce on vulnerabilities as businesses move their data beyond their four walls. At...

Read More


Cybersecurity in the Supply Chain: Why Vulnerability Management is Key

A new report from the U.S. government’s ICT Supply Chain Risk Management Task Force includes guidance on vulnerability management, mitigation and prioritization as key to understanding operational risk. Information communications technology (ICT) — defined by the National Institute of Standards and Technology (NIST) as “the capture, storage, retrieval, processing, display, representation, presentation, organization, management, security, transfer and interchange of data and information— is critical to...

Read More


3 Reasons Why DAST Is the Best Way to Begin the Web Application Security Journey

To fully secure your web applications, you need several software solutions, specialist internal resources, and external contractors. However, this means significant costs and not everyone can afford it all at once. How should small businesses start their web application security journey? Let’s have a look at your options and the reasons why DAST is a clear winner as the starting point for web application security....

Read More


New Visibility Features in Symantec Endpoint Detection and Response (EDR)

A rising number of cyber attacks exploit common blind spots in enterprise infrastructures. The new Symantec EDR toolset is a strong defense against attackers Cyber security is a relentless, high-stakes game of cat-and-mouse. And nowhere is this more true than in the realm of endpoint security. As enterprises have ramped up their investment in tools like endpoint protection platforms (EPP) and endpoint detection and response...

Read More


Are You Keeping Up with Web Application Security?

Opinion: Almost every business that has computers buys an antivirus solution. However, relatively few businesses that have their own websites buy vulnerability scanners. I believe that most people don’t buy solutions to protect their web applications not because they don’t feel that it’s necessary but because they don’t realize that effective solutions exist. Imagine talking to a friend of yours and saying that you bought...

Read More


Industrial Attack Vectors: How to Shut Down OT Threats Before An Incident Occurs

s become more sophisticated, security leaders can use attack vectors to identify weak points in their OT infrastructure and stop attacks before they start. Operational technology has been around for decades, controlling the valves, pumps, transmitters and switches that keep our modern infrastructure humming. Protecting these critical functions has historically been a matter of physical security and safety. But as new connected devices populate modern...

Read More


Conquer Your Cyber Risk: Advanced Capabilities in Tenable Lumin That Help

Key security metrics in Tenable Lumin reveal how effectively your team scans for vulnerabilities and remediates critical issues, so you can make process improvements where they matter most. If you’ve made the move from legacy vulnerability management (VM) to a risk-based strategy, you already know the power of prioritizing your remediation efforts. The best way to start reducing risk across your attack surface is to...

Read More


Symantec: Multi-layered Threat Protection

Offering more flexibility and scalability Over the summer, when Symantec, a division of Broadcom (NASDAQ: AVGO), rolled out its new Secure Web Gateway (SWG) solution, it also announced the decoupling of hardware appliances into separate hardware and software components to offer more convenience to customers. In a follow-up move, Symantec Content Analysis (CAS) is similarly being decoupled to offer customers more purchasing flexibility and scalability. Paired with...

Read More


Acunetix update introduces data retention policies, static JavaScript method analysis, user-based timezone settings, and new vulnerability checks

 A new Acunetix update has been released for Windows and Linux: 13.0.200911154, and macOS: 13.0.200911171. This Acunetix update introduces data retention policies for scans and vulnerabilities allowing users to focus on current vulnerabilities. It also introduces the detection of paths in JavaScript code using static method analysis, the ability to retrieve links from several HTTP headers, numerous improvements to vulnerability deduplication, user-based timezone settings, and...

Read More


Page 1 of 3123