Source
DARKReading
Four months after the Log4Shell vulnerability was disclosed, most affected open source components remain unpatched, and companies continue to use vulnerable versions of the logging tool.
If security leaders focus on visibility and metrics, they can demonstrate their programs' value to company leadership and boards.
Acquisition will add Internet-facing attack surface mapping and monitoring to Tenable's internal asset management products.
The move to IaC has its challenges but done right can fundamentally improve an organization's overall security posture.
Lord previously spearheaded security for the Democratic National Committee and held leadership roles at companies including Yahoo, Rapid7, and Twitter.
With Web application programming interface (API) traffic growing quickly, the average cloud-focused company sees three times more attacks.
The FBI warns that ransomware targets are no longer predictably the biggest, richest organizations, and that attackers have leveled up to victimize organizations of all sizes.
Apostro's system will monitor all transactions to identify malicious behavior that can cause damage to DeFi protocols.
SecurityScorecard's Cyber Risk Quantification portfolio helps customers understand the financial impact of a cyber-attack.
This Tech Tip reminds developers and security teams to check what version of Java they are running. Whether they are vulnerable to the ECDSA flaw boils down to the version number.