Search results
Cloud vulnerability management: A complete guide | TechTarget
SearchSecurity.com· 5 days agoWhile there are multiple variations of meaning for cloud vulnerability management, the generally accepted definition is that it is the practice of continuously ...
Coffee Talk: The Case (and Caveats) for Cloud-Based Patch Management -- Redmondmag.com
Redmond· 5 days agoVulnerability management has radically transformed and if it was a challenge when all we had was on premise servers exposed to the internet, it’s become ...
Google Chrome Under Attack—Do This One Thing Now
Forbes· 17 hours agoThis has been a nightmare week for Google and the billions of users around the world relying on the tech giant’s Chrome browser. What a week this has been for Google Chrome. If you're one of ...
10 risk-related security updates you may have missed at RSA | TechTarget
SearchSecurity.com· 2 days agoAI took the spotlight at RSA Conference 2024, but risk management was a prominent theme and many security vendors launched risk-centric tools.
Blackbaud’s 2023 Impact Report Shows How the Company Is Fueling Change
3BL CSRwire· 5 days agoHighlights of Blackbaud’s 2023 Impact Report include maintaining 100% carbon neutrality, cultivating...
3 reasons Synopsys is selling its app security business | TechTarget
SearchSecurity.com· 3 days agoSynopsys announced on May 6, 2024, that it is selling its application security business to private equity firms Francisco Partners and Clearlake Capital Group for $2.1 billion. Read on to learn ...
Cybersecurity challenges persist, but CISA is up to the task
Federal News Network· 5 days agoThe headlines paint a grim picture of cybersecurity. There’s been another major cyberattack, this...
AI helped X-Force hackers break into tech firm in 8 hours
The Register· 6 days agoRSAC An unnamed tech business hired IBM's X-Force penetration-testing team to break in and search...
Report: Organisations Have Endpoint Security Tools But Are Still Falling Short on the Basics
TechRepublic· 6 days agoMost IT and security teams would agree that ensuring endpoint security and network access security...
A Comprehensive Approach to SAP Security
Dark Reading· 7 days agoImplement this checklist to help protect your SAP environment against bad actors.