Email Alerts
-
How to use Microsoft's MAP toolkit security assessment application
Video: Keith Barker of CBT Nuggets details how to use Microsoft's MAP Toolkit security assessment application to find and report on vulnerable endpoints. Screencast
-
Enterprises can obtain value from red teaming exercises, expert says
Red teaming assesses the security of an organization and can be a more effective way to assess the organization's security posture. News
-
Report highlighting SCADA insecurities alarmist, says ICS expert
Study from vulnerability management firm Positive Technologies Security contends that 39% of systems in the U.S. and Europe are vulnerable to attack. News
-
Symantec study highlights complexity of risks posed by zero-day exploits
Zero-day exploits are typically used in targeted attacks, but public disclosure of unpatched flaws significantly increases the use of the exploits. News
-
Application vulnerability disclosures rise, Microsoft finds
The Black Hole attack toolkit is fueling many of the exploits targeting the vulnerabilities, according to Microsoft. News
-
Rapid7 acquires Mobilisafe to assess mobile device risks
Mobile risk management vendor Mobilisafe assesses employee smartphones and tablets for platform vulnerabilities. News
-
Age-old vulnerabilities, attack techniques consistently trip enterprises
Windows security has improved, but longstanding Unix and network vulnerabilities remain an easy target for determined attackers. News
-
Pen testers should broaden scope, focus more on people, expert says
Pen testers often focus on system errors and application flaws, but employees are often an enterprise's greatest weakness, explains Chris Nickerson. News
-
Vulnerability researcher on layered security plan mistakes
A layered security plan is good, but Argonne National Laboratory vulnerability researcher Roger Johnston warns against too many layers. Video
-
AT&T applies new tactics to advanced persistent threat protection
After a year researching and implementing new advanced persistent threat protection tactics, the telco giant has put several new defenses in place. News
Security Management Strategies for the CIO