Vulnerability Management

Why Fixing Every Vulnerability Is Wasting Time and Your Team’s Budget
We have discovered 10,000 vulnerabilities this year. Great, now what? This sounds like a lot of work has been done, but in reality, it is just noise, not a signal.... The post ...

The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in ...
Webinar Recap: How AI is Revolutionizing Cybersecurity in Healthcare
Protecting patient data isn’t just about keeping up with regulations; it’s about safeguarding lives and preserving trust. For healthcare organizations like City of Hope, cybersecurity is a mission-critical responsibility. A breach can ...

Contrast Security and Wiz Integration | Vulnerability Identification and Remediation
Applications are a prime target for cyberattacks. However, many organizations struggle with blindspots at the application layer. They may be doing scans today, but often they’re point-in-time scans leading to a plethora ...

The Evolution of Vulnerability Management with Steve Carter
Steve Carter discusses the evolution of the vulnerability management market, as well as where vulnerability management has failed and why the next phase has to center around automation and scale. The problem, ...
Prophylactic Cybersecurity for Healthcare
How to Be Proactive in a Reactive World In healthcare, preventative medicine is always more effective, less costly, and has better outcomes than waiting until after a serious heart incident occurs. It’s ...

Reasoning in the Age of Artificial Intelligence
Lately, I often hear people asking: “Will Artificial Intelligence replace my job?” Perhaps you’ve had this thought too. More than just a matter of the job market or salary expectations, this question ...

How to Prove the ROI of Your Vulnerability Management Metrics to the Board?
The ROI of Vulnerability Management comes down to the metrics—these might sound boring, but they are the magic numbers that decide whether security spending should be considered a cost or... The post ...

The Ultimate Guide to Vulnerability Assessment
Vulnerability assessment is a process that identifies security weaknesses of any IT system, network, application, or cloud environment. It is a proactive approach to detect and fix security gaps before... The post ...
Can Autonomous LLM Agents Exploit One Day Vulnerabilities?
Introduction – Explaining Arxiv 2404.08144 research on the topic of LLM agents and one day exploits When generative AI first emerged, the cybersecurity community primarily focused on two promising benefits: However, a ...