News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Measure cyber risks and eliminate vulnerabilities
Measure cyber risks and eliminate vulnerabilities

Many companies operate multiple security tools at the same time. Evaluating data from different sources to classify cyber risks and eliminate vulnerabilities is a challenge. At the Qualys Security Conference (QSC) 2023, Qualys introduced its new Enterprise TruRisk platform. The Qualys Enterprise TruRisk platform aggregates cyber risk evidence from a variety of disparate data sources and correlates them using the holistic TruRisk risk scoring framework to provide measurable risk intelligence. This gives users a central tool to measure, communicate and eliminate their cyber risks with precise remedial measures. Identify and eliminate weak points...

Read more

Prioritize and resolve vulnerabilities more easily
Prioritize and resolve vulnerabilities more easily

The provider Ivanti has presented an update for its risk-based vulnerability/patch management of the Ivanti Neurons platform. Ivanti has announced new features for the Ivanti Neurons platform. They strengthen the digital employee experience, provide customers with scalability, and improve vulnerability prioritization and remediation in the face of increasing data breaches and ransomware attacks. To achieve this, the company has merged two of its solutions, Ivanti Neurons for RBVM and Ivanti Neurons for Patch Management. There are also innovations in the areas of Unified Endpoint Management (UEM) and Enterprise Service Management (ESM). The new functions of Ivanti Neurons…

Read more

Resolve vulnerabilities faster with generative AI
Resolve vulnerabilities faster with generative AI

AI-powered recovery helps security teams process vulnerability alerts faster and simplifies their collaboration with development teams. Aqua Security, the pioneer in cloud-native security, expands its Cloud Security Platform with AI-powered recovery for misconfigurations and vulnerabilities. The AI-Guided Remediation feature allows busy security teams to process new vulnerability alerts more quickly to quickly reduce risk and help developers quickly remediate issues. AI-powered remediation The new feature leverages generative AI, is part of Aqua's SaaS extension to Cloud Security Platform, and is available with an Open AI integration with ChatGPT. Goal of integration…

Read more

Eliminate vulnerabilities in the software supply chain faster
B2B Cyber ​​Security ShortNews

Attacks on the software supply chain continue to increase, due in part to companies' increasing reliance on numerous third-party vendors and service providers. To keep a close eye on the threats facing today's organizations, Tanium has now added SBOM to its vulnerability management solution. Open Source Software Threat "Over 92 percent of applications contain open source libraries that may contain hidden vulnerabilities such as Log4j, OpenSSL or Struts that attackers can exploit," said Nic Surpatanu, Chief Product Officer at Tanium. “Tanium SBOM is the only solution on the…

Read more

Modern vulnerability management in IT and OT
Modern vulnerability management in IT and OT

The measurement and improvement of IT security has now arrived at many companies and is being pushed forward. The question of OT security, on the other hand, is still a closed book for many companies. OTORIO explains how IT and OT security can be promoted equally and what role vulnerability management and scoring play in this. What are the most efficient risk reduction measures that achieve the most effective risk reduction for a specific facility, process or an entire production facility? However, once the risk reduction measures are implemented and an acceptable residual risk remains, there is still more work to be done. The reason for this is,…

Read more

Study: Too many app vulnerabilities go live
Study: Too many app vulnerabilities go live

According to a survey of 1.300 CISOs, 75 percent say: Too many app vulnerabilities get into operations. For 79 percent of CISOs, continuous runtime vulnerability management is critical to keep up with the growing complexity of modern multi-cloud environments. Dynatrace, the Software Intelligence Company (NYSE: DT), has released a global study of 1.300 chief information security officers (CISOs) at large organizations. A key finding: The speed and complexity introduced by the use of multi-cloud environments, multiple programming languages ​​and open-source software libraries make vulnerability management difficult. 75 percent of CISOs state that despite multi-layered security measures, gaps...

Read more