Operations | Monitoring | ITSM | DevOps | Cloud

Vulnerability

What Is the National Vulnerability Database?

The National Vulnerability Database (NVD) is an information resource provided by the U.S. government that catalogs security vulnerabilities in a standardized, searchable format. It includes databases containing software and hardware products, their known security flaws (including misconfigurations), as well as their severity and impact. The NVD is an important resource for IT professionals to stay up-to-date with potential security concerns in their IT infrastructure.

Stay Ahead of Known Vulnerabilities with Automated Patch Management

The consequences of not patching are everywhere: remember the Log4j vulnerability that grants hackers complete access to your devices? The best way to prevent this from happening is to use a patched version of Log4j — so why did this become a catastrophic and prolific security vulnerability event? A: Because people hate, forget, or simply dismiss patching as a labor-intensive part of managing their infrastructure.

Introduction to RBVM: A Solution for Vulnerability Management at Ivanti #ivanti

Derek Illum presents the RBVM solution for vulnerability management at Ivanti, detailing its functionality, benefits, and related statistics. The process involves data collection, automation, and integration with other tools. The tool, hosted in the AWS gov cloud, integrates with various systems, including Microsoft Defender for endpoint. Users can explore RBVM, focus on a risk-based approach, and utilize its dashboards and SLA management features.

Ubuntu Security Notices now available in OSV format

Canonical is now issuing Ubuntu Security Notices (USNs) in the open source OSV format. Using the information provided, developers can identify known third-party, open source dependency vulnerabilities that pose a genuine risk to their application and its environment. This collaboration between Canonical and OSV aims to simplify vulnerability management and further enhance security for Ubuntu users.

The Ultimate Cloud Security Checklist: How to Protect Your Brand's Data

The cloud revolution is here. The flexibility, scalability, and cost savings of cloud computing have led businesses of all sizes to migrate operations to the cloud. By 2025, Gartner estimates that over 95% of new digital workloads will be deployed on cloud-native platforms. But this monumental shift is not without risks. High-profile data breaches like the Capital One hack serve as sobering reminders that the cloud introduces new attack surfaces and vulnerabilities.

Top Vulnerabilities and the Power of Patch Management

The cybersecurity landscape in 2023 was increasingly complex, marked by sophisticated types of cyber threats such as ransomware and cyber espionage. Over half of the high-risk vulnerabilities were exploited by threat actors, with ransomware payouts averaging a significant $1,542,333, up from $812,380 in 2022. Phishing attacks dominated, accounting for over 80% of incidents, and 57% of organizations experienced frequent phishing attempts. Additionally, 4,000 ransomware attacks occurred daily since 2016.

Mastering Cybersecurity: Essential OWASP Guidelines for Effective Protection

Join Dwayne McDaniel as he discusses the challenges and essentials of effective cybersecurity, highlighting the impact of bad security practices, the benefits of robust security measures, and the importance of community collaboration. This talk explores practical insights on improving security protocols, leveraging community knowledge, and the significant role of automation in ensuring safe, uninterrupted digital environments.

Navigating the Threat Landscape: Managing Ransomware Vulnerability with RBVM

Ivanti’s Amer Child previews his session at ISS 2024, zeroing in on Ivanti’s RBVM dashboard and how it can be used to manage your organization’s susceptibility to ransomware in a fast-moving threat landscape. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Detect and score application vulnerabilities

With AppDynamics and Cisco Secure Application, you can quickly identify where application vulnerabilities exist and gain insights as to how best to remediate them based on business risk observability. Let technology work for you by keeping up with the most recent vulnerabilities and help you prioritize what to remediate based on business risk.

WAF and Compliance: Meeting Legal and Regulatory Requirements

Building a web application in an online environment that hosts a countless number of bad bots, malicious hackers, and other security threats can be complicated. A web application must first be built to be functional (easy enough, sort of), and to be secure. Ideally, security will be considered from the beginning, and then flaws will need to be addressed upon completion. So, if your organization handles customer data, which it almost certainly does, there are legal and regulatory compliance rules you have to follow.