Vulnerability exploitation has long been a popular tactic for threat actors. But it’s becoming increasingly so – a fact that should alarm every network defender. Observed cases of vulnerability ...
Industries without regulatory pressure often fail to self-regulate on cybersecurity, particularly when security investments ...
Patching vulnerabilities is one of the most basic principles of cybersecurity — and one of the hardest to execute consistently and securely at scale. In today’s threat landscape, adversaries routinely ...
Many organizations prioritize compliance, assuming it ensures security—but does it, actually? Vulnerability management should come first, as security is about proactively identifying and mitigating ...
Now that it's 2025, the C-suite is out of time — and excuses — for avoiding this truth: Traditional vulnerability management no longer provides adequate protection against modern cyber threats. Why?
Swimlane today announced its new Vulnerability Response Management (VRM) Solution that extends beyond siloed vulnerability management by offering risk-based prioritization, exploit intelligence, and ...
Organizations around the world rely on the Common Vulnerabilities and Exposures Program, whose contract with CISA almost expired in April. It serves as the worldwide, de facto standard for ...
As Internet of Things (IoT) andoperational technology (OT) devices proliferate across critical infrastructure, manufacturing, healthcare, and other sectors, they bring with them unique and significant ...
Cybersecurity attacks on the healthcare industry have increased due to the sensitive nature of the data it handles and the critical services it provides. In 2023, there were 725 reported data breaches ...
Federal contractor Mitre, which has dual headquarters in McLean and Massachusetts, expected Wednesday to lose the federal funding needed to operate and maintain its nearly 26-year-old Common ...
CRN’s list of cybersecurity startups to watch in 2026 includes early-stage companies providing identity security, exposure management and data security.
Critical cyber security vulnerability assessmentsA thorough vulnerability assessment is invaluable for IT security teams, risk departments and the organisation as a whole. By Peter Chan, Cyber ...