The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
Security professionals should take advantage of the longest day of the year to take care of security tasks that are typically placed on the back burner.
These six basic strategies can help organizations stop some threats, minimize others and improve their overall security posture.
To protect their WordPress sites from scammers, administrators must proactively patch and monitor their installations to weed out unwanted content.
An effective response to an advanced threat such as WannaCry can be broken down into two phases: vulnerability management and proactive monitoring.
Blocking refers to the practice of deploying network security devices to block threats as they traverse the network.
Effective defense against large-scale ransomware attacks such as WannaCry starts with basic endpoint protection and patch management.
It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
An effective vulnerability management strategy requires continuous visibility into endpoint activity and real-time control over devices in a network.
The disclosure of an Apache Struts 2 vulnerability made the framework a lucrative target and highlighted the importance of patch management.