Get the latest on staffing challenges; nation-state assaults on critical infrastructure; supply chain security tips; ransomware weak links; Kubernetes security; and more!
Citrix publishes an advisory to address multiple flaws in its ADC and Gateway products, including a critical vulnerability.
Microsoft addresses 62 CVEs including four zero-day vulnerabilities that were exploited in the wild.
Experts say “shift left” practices are falling short. Here’s what you need to know and what you can do about it. Researchers are calling on companies to do a better job of educating developers abou...
Get the latest on salary trends for CISOs and cybersecurity pros; CISA’s call for adopting phishing-resistant MFA; the White House’s ransomware summit; and more!
When our data engineering team was enlisted to work on Tenable One, we knew we needed a strong partner. Here’s how we selected Snowflake to help us deliver on the promise of exposure management.
OpenSSL has patched two vulnerabilities, pivoting from its earlier announcement, in version 3.0.7.
Get the latest on Microsoft 365 security configurations; effective CISO board presentations; rating MSPs’ cybersecurity preparedness; and hospitals’ Daixin cyberthreat.
Google’s annual DevOps report finds that organizations with a low-blame, collaborative approach have stronger app dev security practices.
CVE-2021-39144: VMware Patches Critical Cloud Foundation Vulnerability in XStream Open Source LibraryOctober 26, 2022
VMware issues patches for end-of-life versions of Cloud Foundation Network Security Virtualization for vSphere (NSX-V) to address a critical vulnerability in an open source library. Background ...
Topics that are top of mind for the week ending Oct. 21 | The problem with Gen Zers and Millennials | Global shortage of cybersecurity pros worsens | An informal poll about attack surface growth | Password usage drops a bit | And much more!
Securing today's complex and dynamic IT environments requires bringing together vulnerability management, web application security, cloud security, identity security, attack path analysis and external attack surface management to help you understand the full breadth and depth of your exposures.