Stay on top of your enterprise vulnerabilities by learning the best ways to manage them. Check out the common challenges faced in vulnerability management and learn how to combat them effectively.

Multiple Flaws in Orbit Fox WordPress Plugin Allow a Complete Takeover of Sites

The Threat Intelligence team of Wordfence discovered two security vulnerabilities in the Orbit Fox WordPress plugin on November 19, 2020.…

Continue Reading Multiple Flaws in Orbit Fox WordPress Plugin Allow a Complete Takeover of Sites

Hackers Steal FireEye’s Red Teaming Tool Through a Highly-Sophisticated Attack

FireEye is an IT security company focusing on providing security products and services to its customers. On December 8th, 2020,…

Continue Reading Hackers Steal FireEye’s Red Teaming Tool Through a Highly-Sophisticated Attack

Critical Zero-Day in HPE Systems Insight Manager Revealed

Hewlett Packard Enterprise recently revealed a security flaw in its Systems Insight Manager software. This zero-day bug resides in the…

Continue Reading Critical Zero-Day in HPE Systems Insight Manager Revealed

Closing the Ever-Widening Gap Between Vulnerability Detection and Patching

Security risk management is a complicated and time-consuming affair. Organizations spend many resources to make sure all their business operations…

Continue Reading Closing the Ever-Widening Gap Between Vulnerability Detection and Patching

Open-Source Vs. Commercial Vulnerability Management Tools: How a Free Tool Carries Hidden Challenges

When vulnerability management started out as a practice 15 years ago, the process was straightforward and simple in function. An…

Continue Reading Open-Source Vs. Commercial Vulnerability Management Tools: How a Free Tool Carries Hidden Challenges

What is Continuous Compliance and Why It’s More Than “Just a Perk”

Organizations regularly face compliance audits that keep them up at night every quarter or year-end. To secure PII (personally identifiable…

Continue Reading What is Continuous Compliance and Why It’s More Than “Just a Perk”

5 Steps to Build an Effective Vulnerability Management Program

Vulnerability management is a standardized process across most organizations. However, even organizations that follow periodic compliance audits and patch software…

Continue Reading 5 Steps to Build an Effective Vulnerability Management Program