Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk-Based Vulnerability Management is the Engine Behind Modern CTEM Programs

Traditional vulnerability management once centered on scanning, enumerating, and remediating … and then repeating the process. In contrast, today’s enterprise attack surfaces shift by the hour. Cloud assets spin up and down. Business units deploy new SaaS tools overnight. Adversaries weaponize proof-of-concept exploits in days, or sometimes hours. Static, reactive processes can’t keep up.

Mobile App Security Assessment: Identifying Risks Before Attackers Do

Misconfigurations in storage and encryption settings can put your mobile apps at risk, but so can social engineering attacks. Mobile devices are powerful productivity tools, enabling your staff to work from almost anywhere. They can also be security risks, sharing sensitive data outside of a tightly controlled office environment. If smartphones and tablets are integral to your organization’s day-to-day workflows, a mobile application security assessment should be part of your cybersecurity strategy.

9 AI risks that could impact your organization-and how to mitigate them

As AI becomes more user-friendly and performance-focused, organizations are increasingly adopting it into their systems to streamline elaborate workflows. However, the rapid pace of adoption means that teams often implement AI models before fully mapping the security and compliance implications that they bring. ‍ According to Vanta’s State of Trust Report, more than 50% of organizations view AI risks as a growing concern today.

CVE-2024-36401 - GeoServer - tailoring a public PoC to enable at-scale high-confidence detection

At Bitsight, one of the responsibilities of the Vulnerability Research team is to develop fingerprinting methods to not only identify exposed services, but also vulnerabilities in those services. When it comes to detecting vulnerabilities, there are increased challenges depending on the complexity of both the vulnerability and the vulnerable service.

GeoServer CVE-2024-36401: Tailoring a Public PoC to Enable High-Confidence Detection

At Bitsight, one of the responsibilities of the Vulnerability Research team is to develop fingerprinting methods to not only identify exposed services, but also vulnerabilities in those services. When it comes to detecting vulnerabilities, there are increased challenges depending on the complexity of both the vulnerability and the vulnerable service.

How Risk Scores Are Assigned to Threats: Understanding the Metrics That Drive Security Decisions

Here’s the reality: Most organizations are drowning in threat alerts, vulnerability reports, and security incidents. Security teams can’t tackle everything at once, yet the leadership keeps asking “What should we prioritize?” Without proper risk scoring, you’re essentially playing cybersecurity roulette with your business assets.

Threat-Informed TPRM: A New Standard for Supply Chain Security

Third-party attacks have emerged as one of the most critical threats in the modern cyber landscape. Adversaries increasingly exploit vulnerabilities within external vendors, suppliers, contractors, and service providers to gain indirect access to target organizations, often with severe consequences. These breaches can lead to significant data loss, operational disruption, regulatory penalties, and reputational damage.

AI Adoption Is Outpacing Governance: Conversations on Managing AI Risk

Executives everywhere are under pressure to deploy AI fast — but our recent roundtable on AI risk, hosted by TEISS, revealed a growing concern: AI adoption is outpacing governance, and organisations are taking on more risk than they realise. While most enterprises have mature technical controls, many are missing visibility into how AI is being used — and by whom.

Introducing GuardNest - Your Central Platform For Security Risks

Pentest People is proud to announce the release of GuardNest, the next evolution of its award-winning cybersecurity platform, previously known as SecurePortal. Version 3 of the platform delivers a completely new look and feel, marking a major milestone in the company’s ongoing partnership with WorkNest and its mission to make security management simpler, smarter, and more collaborative.