Hackers Steal FireEye’s Red Teaming Tool Through a Highly-Sophisticated Attack

FireEye is an IT security company focusing on providing security products and services to its customers. On December 8th, 2020,…

Continue Reading Hackers Steal FireEye’s Red Teaming Tool Through a Highly-Sophisticated Attack

Closing the Ever-Widening Gap Between Vulnerability Detection and Patching

Security risk management is a complicated and time-consuming affair. Organizations spend many resources to make sure all their business operations…

Continue Reading Closing the Ever-Widening Gap Between Vulnerability Detection and Patching

Open-Source Vs. Commercial Vulnerability Management Tools: How a Free Tool Carries Hidden Challenges

When vulnerability management started out as a practice 15 years ago, the process was straightforward and simple in function. An…

Continue Reading Open-Source Vs. Commercial Vulnerability Management Tools: How a Free Tool Carries Hidden Challenges

What is Continuous Compliance and Why It’s More Than “Just a Perk”

Organizations regularly face compliance audits that keep them up at night every quarter or year-end. To secure PII (personally identifiable…

Continue Reading What is Continuous Compliance and Why It’s More Than “Just a Perk”