Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vulnerability

The Year of the Pandemic and 2021 Cybersecurity Predictions

2020 will always be remembered as the year our lives changed dramatically due to the Coivd-19 pandemic. Here our panel of security experts look back at the lessons learned in the past 12 months and share their predictions for the key security challenges organizations will face in 2021.

Six key findings from the 'DevSecOps Practices and Open Source Management in 2020' report

This week Synopsys released the “DevSecOps Practices and Open Source Management in 2020” report, findings from a survey of 1,500 IT professionals working in cyber security, software development, software engineering, and web development. The report explores the strategies that organizations around the world are using to address open source vulnerability management, as well as the problem of outdated or abandoned open source components in commercial code.

4 Things a Good Vulnerability Management Policy Should Include

Organizations face an ever-evolving threat landscape. With this in mind, it is imperative that organizations keep an up-to-date vulnerability management policy for remediating and controlling security vulnerabilities that may lead to a breach. A good vulnerability management policy should contain the following.

Detectify checks for critical Oracle WebLogic Server RCEs (CVE-2020-14882, CVE-2020-14750)

On October 29th, Detectify released a security test to detect a critical Oracle WebLogic Server RCE – CVE-2020-14882. Again in November, Oracle released an out-of-band security patch to fix a related RCE for Oracle Fusion Middleware. These vulnerabilities are currently being exploited by multiple botnets in the wild. Detectify scans your application for both of these vulnerabilities and will alert you if you are running a vulnerable version of Oracle WebLogic Server.

How to mitigate Ransomware attacks

Ransomware is a serious security threat affecting companies of all sizes and industries. While the symptoms (an attack) can be extremely damaging and disruptive, the solution can be simple - proactive prevention through a heavy dose of security hygiene. Here we cover the basics of Ransomware and top tips for securing your organization against it.

Outpost24 webinar - Risk based vulnerability management: What's in a risk score?

In this webinar we’ll provide expert insights into the limitation of CVSS and what goes into a vulnerability risk score, including vendor by vendor and what we look at to determine the risk of a vulnerability to help security managers prioritize and make better informed decisions for remediation. We will identify the benefits of a risk-based approach, highlighting how this can make vulnerabilities more manageable and streamlining remediation through automation and orchestration.

Outpost24 webinar - Cloud security controls best practice

Watch our recorded webinar to discover the critical cloud security controls when migrating to IaaS and PaaS, plus how to build a rich cloud transformation experience and deliver long term operational benefits. As we strive to have greater controls on cloud risk, how can we spend our time more efficiently to focus on what we don’t own and building a more robust cloud operating model? Cloud Security remains a big challenge and whilst the Cloud Security Alliance (CSA) is celebrating its 11th anniversary in 2020 are we any closer to fully understanding the techniques to ensure complete cloud security coverage.

Outpost24 webinar - Securing DevOps in Cloud Environments

The Covid-19 crisis has wreaked havoc on software development, with businesses being forced to adapt and ensure DevOps can carry on to the same production levels and speed as before. As IT and development infrastructure move to the public cloud at an unprecedented rate, the shared responsibility of cloud can create severe security challenges in terms of visibility, control and compliance.