TechNews

Cybersecurity in the Supply Chain: Why Vulnerability Management is Key

A new report from the U.S. government’s ICT Supply Chain Risk Management Task Force includes guidance on vulnerability management, mitigation and prioritization as key to understanding operational risk. Information communications technology (ICT) — defined by the National Institute of Standards and Technology (NIST) as “the capture, storage, retrieval, processing, display, representation, presentation, organization, management, security, transfer and interchange of data and information— is critical to...

Read More


Acronis acquires CyberLynx, a leader in security audits, pen-tests, cyber forensics, and training services

In our mission to deliver strategies, services, and solutions that provide comprehensive cyber protection, Acronis has been actively looking to develop new data protection and cybersecurity capabilities. Some of these are developed by our team, while others are gained through strategic acquisitions. Today, we’ve added a powerful set of new services and technical expertise by acquiring CyberLynx, a leading cybersecurity consultancy based in Israel. Advanced...

Read More


3 Reasons Why DAST Is the Best Way to Begin the Web Application Security Journey

To fully secure your web applications, you need several software solutions, specialist internal resources, and external contractors. However, this means significant costs and not everyone can afford it all at once. How should small businesses start their web application security journey? Let’s have a look at your options and the reasons why DAST is a clear winner as the starting point for web application security....

Read More


New Visibility Features in Symantec Endpoint Detection and Response (EDR)

A rising number of cyber attacks exploit common blind spots in enterprise infrastructures. The new Symantec EDR toolset is a strong defense against attackers Cyber security is a relentless, high-stakes game of cat-and-mouse. And nowhere is this more true than in the realm of endpoint security. As enterprises have ramped up their investment in tools like endpoint protection platforms (EPP) and endpoint detection and response...

Read More


Are You Keeping Up with Web Application Security?

Opinion: Almost every business that has computers buys an antivirus solution. However, relatively few businesses that have their own websites buy vulnerability scanners. I believe that most people don’t buy solutions to protect their web applications not because they don’t feel that it’s necessary but because they don’t realize that effective solutions exist. Imagine talking to a friend of yours and saying that you bought...

Read More


Industrial Attack Vectors: How to Shut Down OT Threats Before An Incident Occurs

s become more sophisticated, security leaders can use attack vectors to identify weak points in their OT infrastructure and stop attacks before they start. Operational technology has been around for decades, controlling the valves, pumps, transmitters and switches that keep our modern infrastructure humming. Protecting these critical functions has historically been a matter of physical security and safety. But as new connected devices populate modern...

Read More


Conquer Your Cyber Risk: Advanced Capabilities in Tenable Lumin That Help

Key security metrics in Tenable Lumin reveal how effectively your team scans for vulnerabilities and remediates critical issues, so you can make process improvements where they matter most. If you’ve made the move from legacy vulnerability management (VM) to a risk-based strategy, you already know the power of prioritizing your remediation efforts. The best way to start reducing risk across your attack surface is to...

Read More


Page 2 of 1112345...10...Last »