When developing a vulnerability strategy, it is important to think through the “what if” scenarios that an organization needs to defend against. However, if an organization is only taking into consideration its own knowledge of potential threats, then the plan will likely be incomplete.
In this slideshow, AlienVault, provider of Unified Security Management™ solutions and crowd-sourced threat intelligence, examines how to use crowd-sourced data to strengthen vulnerability management strategies to stay ahead of exploits.
The patches released by Microsoft for the August Patch Tuesday include nine bulletins (two critical and seven important) and cover 38 CVEs. ... More >>
Here are five steps organizations and individual users should take now to protect their most sensitive password-protected information. ... More >>
Study finds that nearly half of network operations staff do not use network monitoring tools, limiting visibility into network events and leading to finger pointing among IT groups. ... More >>