If you search for definitions of threat hunting, you’ll see several variations, but they all center on one extremely mistaken idea—it is a form of proactive cyber defense. That can’t be further from ...
Critical cyber security vulnerability assessmentsA thorough vulnerability assessment is invaluable for IT security teams, risk departments and the organisation as a whole. By Peter Chan, Cyber ...
Calvin Hennick is a freelance journalist who specializes in business and technology writing. He is a contributor to the CDW family of technology magazines. Heavy-industry firms — including energy ...
Google has given an already-known security vulnerability a new CVE ID with the highest severity level. The reason for this is that the vulnerability, originally classified as a Chrome bug, affects ...
There are almost as many different cybersecurity assessments as there are myths about them. It’s important to know what’s true. Let’s face it: Security assessments aren’t much fun for the team on the ...
Forrester has just completed a comprehensive assessment of vulnerability management products. The Forrester Vulnerability Management Wave report is now live. If you are a Forrester client, please see ...