Recently, threat actors exposed and exploited multiple vulnerabilities in Ivanti's connect secure.
In this webinar, C-level experts will examine the fallout from the publication of two critical Ivanti vulnerabilities, shedding light on their potential impact and the urgency for proactive risk mitigation.
Join...
Discover how to bridge the gap between perception and reality in cybersecurity asset management.
Learn key strategies for:
Owning the Asset Inventory: Security teams must take control of asset inventory to ensure comprehensive visibility and protection.
Adopting Continuous Real-time Inventory:...
Research from Accenture finds three-quarters (74%) of CEOs are concerned about their organizations’ ability to avert or minimize damage to the business from a cyberattack—despite the fact that 96% of CEOs said that cybersecurity is critical to organizational growth and stability.
Whether your IR team is part of...
In today's interconnected digital landscape, managing your exposure strategy for your infrastructure and your supply chain is paramount. This interview discusses strategies to fortify cybersecurity defenses and minimize risks.
Supply chain security firm Eclypsium found corporate VPN maker Ivanti's Pulse Secure devices - which underwent much emergency patching amid a likely Chinese espionage zero-day hacking campaign - operate on an 11-year old version of Linux and use many obsolete software packages.
Venture-capital owned Armis, a firm that touts its ability to prepare companies for attacks before they materialize, acquired cybersecurity startup CTCI in a transaction approaching $20 million. Armis will merge CTCI employees and technology over the next 30 days.
Today’s threat landscape is more pervasive and autonomous threats than ever. It’s not a matter of if or even when an attack happens, but how often and to what degree. Security leaders are under immense pressure to prove that they can ensure business continuity in the event of an attack.
Join this session as we...
Software developers are in a race against time to patch a flaw that could result in supply chain attacks, warned the integrated development environment maker JetBrains, which on Monday released an urgent patch for an authentication bypass flaw in its CI/CD TeamCity product.
A security vulnerability in Fortra's GoAnywhere managed file transfer software can allow unauthorized users to create a new admin user. The vulnerability is a remotely exploitable authentication bypass flaw. Hackers have targeted file transfer software over the past year, including GoAnywhere MFT.
Most organizations have a difficult time identifying their external attack surface, let alone managing it. Facing everything from the rapid growth of shadow IT to the high labor cost of identifying and contextualizing potential threats, on average, organizations find at least 30% more assets when using an external...
Leverage IDC’s research and insights to understand the most critical elements to create a successful attack surface management project so you can keep your internet-exposed assets safe from cyberattackers. In this Technology Assessment Guide, you will access checklists to measure potential EASM vendors in the...
CyCognito and the AimPoint Group surveyed 329 IT and security professionals in the US, UK, and Canada to understand more about the challenges that organizations face in managing their external attack surface.
As IT ecosystems continue to evolve, it is clear that open vulnerabilities create significant security...
Your attack surface has grown, it’s now in cloud infrastructure and across subsidiaries and unknown, unmanaged assets are everywhere. How are you finding these? Attackers look for, find and attack these unknown assets and when there are externally exposed risks, sensitive data and critical systems are put in...
Infrequent surveying for external exposure combined with frequent fluctuation in the external attack surface’s size adds up to serious gaps in awareness and coverage. To stay aware of risks as soon as they appear, it’s critical to use frequent mapping and scanning of all of an organization’s assets to maintain...
The threat landscape is ever evolving. Modern threat actors constantly develop new tactics, techniques and procedures (TTP) so it's crucial to stay up to date with the latest strategies for protecting your organization.
Security experts from Unit 42™ have unveiled the most commonly observed TTPs in ransomware and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.