CATEGORY: VULNERABILITY MANAGEMENT

  • Preventing Magecart Attacks Through Supply Chain Vulnerabilities

  • CVE-2024-3400 – PAN-OS OS Command Injection Vulnerability in GlobalProtect Gateway

  • Continuous Threat Exposure Management (CTEM) – Automation & Management

  • The Difference Between Authentication Bypass and Unauthorized Access

  • Security Validation Explained

    Security Validation Explained: A Trusted Path to Risk Reduction

  • what is cyber risk management

    What is Cybersecurity Risk Management?

  • The Complete Vulnerability Assessment Checklist

    The Complete Vulnerability Assessment Checklist

  • Vulnerability Assessment Methodology: How to Perform a Vulnerability Assessment

  • CVE-2023-34362 

    CVE-2023-34362: SQLi Zero Day Vulnerability in MOVEit Transfer exploited in the wild 

  • 27 Cybersecurity Professionals and Business & Technology Leaders Reveal the Most Important Cyber Risk Trends Companies Need To Look Out for

  • 31 Cybersecurity and IT Management Professionals Share Their Favorite Vulnerability Management Interview Questions

  • risk management and attack surfaces

    FTX, risk management, and attack surfaces – Visibility is the Key