CATEGORY: THREAT EXPOSURE MANAGEMENT

  • Asset Discovery: A Starting Point, Not a Security Strategy

  • The CVE Program Is on Life Support – and So Is Our Outdated Approach to Vulnerability Management 

  • Prophylactic Cybersecurity for Healthcare

  • What Is CTEM? Understanding Gartner’s CTEM Framework

  • Continuous Risk Assessment: The Connecting Thread in CTEM

  • Exploited! Kerio Control’s HTTP Response Splitting Vulnerability (CVE-2024-52875)

  • Mitel MiCollab NVM CVE

    Exploited! NuPoint Unified Messaging (NPM) Component of Mitel MiCollab

  • CTEM: The Strategic Imperative for Modern Security Operations

  • Exploitable! CVE-2024-0012 Authentication Bypass for PAN-OS

  • CVE-2024-10924 Explained: Security plugin flaw in millions of WordPress sites

  • CVE-2024-8068 and CVE-2024-8069: Citrix Session Recording Vulnerability

  • Understanding CVE-2024-50340 – Remote Access to Symfony Profiler