Operations | Monitoring | ITSM | DevOps | Cloud

How to conduct a vulnerability assessment

The realm of information security is fraught with jargon, as anyone who has come across vulnerability-related terms can tell you. To complicate matters further, some of these terms are used interchangeably or in contexts outside of computing. This can muddy the waters for people looking to learn about vulnerability assessments – so in this blog we’ll begin by demystifying the language, before delving into how you can perform vulnerability assessments on Ubuntu installations.

Subaru Cars Have A Massive Security Vulnerability

Security researchers found a massive flaw in Subaru’s remote vehicle system—hackers could unlock and track cars easily. The culprit? Homemade authentication protocols. Lesson: Don’t DIY security. Use trusted, third-party solutions. What do you think Subaru should have done differently?

What is Data Cleansing and Why Does it Matter for Vulnerability Monitoring?

If your business relies on data for decision-making, you'll know how important data cleansing is. But it's not just a key part of gaining accurate and reliable insights — it's also important for security. We'll look at what data cleansing is, how it relates to vulnerability monitoring, and how to get started.

10 Application Security Vulnerabilities and Defensive Strategies

Application security is a critical aspect of maintaining trust and integrity in your software. With an increasing number of cyberattacks targeting vulnerabilities in applications, it is essential to understand the common risks and take defensive measures to safeguard systems. Below are 10 prevalent application security vulnerabilities, along with real-world examples and effective defensive strategies.

Proactive Protection with Exposure Management #shorts

Exposure management evolves from vulnerability management by focusing on eliminating cyber exposures to improve security. It emphasizes the need for visibility of all cyber assets, including applications and devices, as protection is impossible without it. This approach prioritizes remediation based on real-world risks and includes a validation step to assess potential exploitation, helping organizations focus on critical exposures and develop effective strategies for visibility.

Achieve Unite - Vulnerabilities #technology

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere. Exceptional employee experiences Any device. Any location. Ensure proactive, efficient service so employees can work how they want.

3 Key Benefits of Integrating DevOps with Security Standards

Bringing DevOps and security standards together is no longer a nice-to-have; it's essential for building resilient, efficient workflows. When you weave security directly into every stage of the development cycle, you're improving collaboration and speeding up delivery. This integration helps overcome traditional barriers between teams while addressing compliance requirements with ease. Whether it's catching vulnerabilities early or maintaining trust through secure practices, this powerful combination delivers benefits at every level.

Security vulnerability uncovered and patched in the golang.org/x/crypto /ssh package

Upsun teams are always striving to ensure a safe space for all developers within our product. And this consistent diligence led to the Upsun Engineering team discovering a security vulnerability in the golang.org/x/crypto/ssh package on 5 September 2024. Upon investigating an unexpected Panic: runtime error: invalid memory address or nil pointer dereference message in our edge proxy, the engineers discovered a misimplementation of the PublicKeyCallback function.

Monitoring Security Vulnerabilities in Your Cloud Vendors

If you manage applications running on cloud platforms, you likely depend on multiple cloud vendors and services. These could be infrastructure providers like AWS, GCP or Azure. A vulnerability in any of these services could potentially impact your applications and your users. A cloud platform has many moving parts, many of which are dependent on other third-party providers.

What is vulnerability management?

Today, computers are more sophisticated, interconnected and complex than ever. This means they’re more capable than ever – but it also comes with a downside: that their attack surface is larger than ever, leading to an elevated risk of cyber incidents. Therefore, your approach to managing vulnerabilities needs to be holistic and prepare for all the ways in which vulnerabilities could cause damage to users, systems or your organization’s operations and reputation.