FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
โ˜ โ˜† โœ‡ The Hacker News

CTEM 101 - Go Beyond Vulnerability Management with Continuous Threat Exposure Management

By: The Hacker News โ€” March 12th 2024 at 11:07
In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing youโ€™d want to do. But if you are looking for ways to continuously reduce risk across your environment while making significant and consistent improvements to security posture, in our opinion, you probably want to consider establishing a Continuous Threat Exposure
โ˜ โ˜† โœ‡ The Hacker News

Webinar โ€“ Leverage Zero Trust Security to Minimize Your Attack Surface

By: Newsroom โ€” January 8th 2024 at 09:01
Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the vulnerabilities stemming from software and infrastructure exposed to the internet; this ironically includes security tools, particularly firewalls and VPNs, which give attackers direct network access to execute their attacks. In fact, Gartner&
โ˜ โ˜† โœ‡ The Hacker News

Smart Mobility has a Blindspot When it Comes to API Security

By: The Hacker News โ€” March 29th 2023 at 11:43
The emergence of smart mobility services and applications has led to a sharp increase in the use of APIs in the automotive industry. However, this increased reliance on APIs has also made them one of the most common attack vectors. According to Gartner, APIs account for 90% of the web application attack surface areas.ย  With no surprise, similar trends are emerging also in the smart mobility
โ˜ โ˜† โœ‡ The Hacker News

Syxsense Platform: Unified Security and Endpoint Management

By: The Hacker News โ€” March 8th 2023 at 12:26
As threats grow and attack surfaces get more complex, companies continue to struggle with the multitude of tools they utilize to handle endpoint security and management. This can leave gaps in an enterprise's ability to identify devices that are accessing the network and in ensuring that those devices are compliant with security policies. These gaps are often seen in outdated spreadsheets that
โŒ