As attack surfaces have grown, so has risk - and adversaries are finding new ways to infiltrate organizations. Wade Ellery of Radiant Logic discusses the convergence of risk, identity management and zero trust security, spelling out new strategies to defend attack surfaces and minimize risk.
New CEO Bryan Ware plans to leverage LookingGlass' nascent attack surface management capabilities to capture clients in verticals such as pharmaceuticals, manufacturing and utilities. The company tapped former CISA leader Ware to serve as its next CEO following the acquisition of Next5.
Many organizations are unable to accurately identify their rapidly changing attack surface. Attack surface management (ASM) solutions aim to address this challenge. This analyst report assesses the landscape of ASM solutions and how well each is positioned to serve small, mid-market and large enterprises.
Dive into...
In this time of heightened consumer expectations, the financial services industry continues to be one of the top targets for cyberattacks. To develop hyper-personalized experiences, financial institutions are engaging with more third-party partners (e.g., traditional competitors, fintech, Big Tech) to share data and...
Researchers at security firm ESET have found three vulnerabilities affecting Lenovo laptops worldwide and targeting users who work from home. Two of the flaws affect UEFI firmware drivers meant for use only during the manufacturing process of Lenovo notebooks, and one is a memory corruption bug.
A week after Microsoft announced the Windows Autopatch feature and declared that, come July, the tradition of Patch Tuesday will end, it's Patch Tuesday again, and the company has issued more than 100 security fixes for software that resolve critical issues, including two zero-day vulnerabilities.
Dragos's annual ICS/OT Cybersecurity Year in Review Report provides in depth analysis of ICS vulnerabilities, global threat activity targeting industrial environments, and industry trends and observations gathered from customer engagements worldwide.
Download this fifth annual report for insights driven from data...
Digital transformation is led by applications which eventually decide your cloud strategy & most of the time these applications end-up running in siloed multiple clouds governed by technical and cost reasons. With growth in application portfolio across Hybrid, Multi-cloud, organizations are under tremendous pressure...
Hybrid cloud is on the rise, but organizations may not have the right IAM solution in place to make their implementations successful.
ForgeRock and Google Cloud commissioned a study through Forrester Consulting to understand how identity and access management (IAM) decision makers in large organizations are handling...
The disruption of tens of thousands of Viasat consumer broadband modems across central Europe on Feb. 24 when Russia invaded Ukraine may have involved "AcidRain" wiper malware, security researchers at SentinelOne report. Viasat says those findings are "consistent" with the known facts of the attack.
The most productive security teams are going beyond the use of tactical tools for investigation and reporting of security incidents. Instead, they are taking a more strategic, proactive, platform-oriented approach to identifying and assessing security-related risks, proving compliance, and maturing the flexibility and...
Healthcare and Life Sciences organizations know that while IoT devices are necessary for the modern healthcare environment, they can pose real security risks if proper protections are not put into place. From dealing with devices running outdated software to diagnosing networks gone haywire, we’ll talk through some...
Healthcare and Life Sciences organizations know that while IoT devices are necessary for the modern healthcare environment, they can pose real security risks if proper protections are not put into place. You must defend your critical assets, so you can achieve your critical mission.
From dealing with devices...
In their Security Operations Primer, Gartner has recently identified Attack Surface Management as one of the top security trends and priorities for 2022. In this webinar you will learn how to address this problem by combining ASM, Vulnerability Management and Threat Intelligence into a single solution.
Join us...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.