Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Using Forward's Vulnerability Analysis with Fabrizio Maccioni

Forward Enterprise provides a vulnerability analysis of network devices that automatically compares the CVE information from the NIST database with the OS version running on the devices. The enhanced analysis helps prioritize remediation efforts by reducing the likelihood that unimpacted devices are reported as vulnerable.

JSON Basics: Building Blocks for Workflow Automation

Automation workflows add a lot of value to an organization’s day-to-day operations. At a minimum, they streamline the execution of complex, multi-step processes, thereby allowing people to focus on higher-value tasks. On top of that, automation workflows can provide valuable insights through the metrics that they gather – including the number of requests, the date and time they were requested, the time it took to complete each request, who made the request, and much more.

What you need to know about PCI 4.0: Requirements 10, 11 and 12

As we continue our review of the 12 Requirements of PCI DSS version 4.0, one has to stop and consider, is it possible to have a favorite section of a standard? After all, most guidance documents, as well as regulations are seen as tedious distractions from the importance of getting the job done. However, depending on a person’s position and function in an organization, it is possible to “geek out” on some of the information in these official papers.

Easily remediate the CVEs most likely to harm you using Forward Enhanced Device Vulnerability Analysis

Headline grabbing vulnerabilities, like SolarWinds and Log4Shell, target management software and end hosts, but if you search for “most exploited vulnerabilities” on Google, you will quickly learn that some of them directly target network and security devices as well as server load balancers. These are the 3 most exploited CVEs in the last couple of years: Would you be surprised to learn that network device operating systems can be vulnerable to security flaws like any other software?

SIEM vs SOAR : Evaluating security tools for the modern SOC

A common question we receive is: should security orchestration, automation and response (SOAR) replace security information and event management (SIEM)? While the two technologies share some common components, they serve different purposes. As security teams look to modernize their security operations center (SOC) to meet the demands of cloud environments, automation is the key priority. To that end, it’s vital to understand the roles of both SIEM and SOAR.

What is an IT Security Network vs. a Cyber Security Network?

The terms "IT security network" and "cyber security network" are often used interchangeably, but there is a big difference between the two. An IT security network is focused on protecting your organization's computer systems and data from unauthorized access, while a cyber security network is designed to protect your entire organization from cyber attacks, including those that target your physical infrastructure.

Ransomware volume already doubled 2021 total by end of Q1 2022 says WatchGuard Threat Lab Report

New research shows Log4Shell detections tripled, PowerShell scripts heavily influenced a surge in endpoint attacks, the Emotet botnet came back in a big way and malicious cryptomining activity increased.