Vulnerability Management
Researchers reveal cloud identity has a nasty Silver SAML lining for SolarWinds users
Security researchers warn that a new compromise methodology could hit SolarWinds users - especially if they followed mitigation advice following 2020's Golden SAML attacks.
CVSS 4.0 vulnerability rating standard fails to provide patch peace-of-mind
The new CVSS 4.0 vulnerability rating is finally here, but Davey Winder isn't convinced it will help businesses tackle the prioritisation problem.
cURL vulnerability means every device connected to the internet will need to be patched tomorrow
There's a problem with an open-source tool that underpins all internet protocols, explains Davey Winder, and that means everything from games consoles to printers will need a security update.
Securing Microsoft 365
This e-book explores modern threats, best practices for protecting users and data, and what capabilities to look for when enhancing your Microsoft 365 defences
Redefining Data Loss Prevention (DLP)
Why insider threat management should be a critical part of your data loss prevention program.
2023 State of The Phish in Asia-Pacific
Download 2023 State of the Phish: Asia-Pacific and Japan to learn the biggest regional cyber threats and how to make your users your best defense.
Protecting the End User
This gated guide reveals how companies can best assess and mitigate user risk and how they can use that information to implement a successful and people-centric cybersecurity strategy.
Best Practices for Selecting a Vulnerability Management (VM) Solution
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right…