When developing a vulnerability strategy, it is important to think through the “what if” scenarios that an organization needs to defend against. However, if an organization is only taking into consideration its own knowledge of potential threats, then the plan will likely be incomplete.
In this slideshow, AlienVault, provider of Unified Security Management™ solutions and crowd-sourced threat intelligence, examines how to use crowd-sourced data to strengthen vulnerability management strategies to stay ahead of exploits.
In the final Patch Tuesday for Windows XP and Office 2003, Microsoft released four patches today, two critical and two important, that cover a total of just 11 CVEs. ... More >>
The increase in organizations encouraging or offering telecommuting programs demonstrates a strong, immediate need for secure remote access and file-sharing strategies for the enterprise. ... More >>
A categorical review of cloud security needs associated with the use of public IaaS, SaaS and governance of cloud services. ... More >>