Illumio announced new innovations in Illumio Core which automate, accelerate, and simplify the path to a zero trust posture. Cyberattacks and ransomware are most successful when they break through the perimeter and move, often undetected, throughout an…Read More Illumio Core advancements help protect key assets from cyberattacks and ransomware
Open Cybersecurity Alliance (OCA) announced it has accepted IBM’s contribution of Kestrel, an open-source programming language for threat hunting that is used by Security Operations Center (SOC) analysts and other cybersecurity professionals. Kestrel s…Read More IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance
Skybox Security announced new vulnerability prioritization capabilities with prescriptive remediation analysis. Customers can now zero in on specific remediation options that have the greatest impact on reducing exposure to cybersecurity attacks. The n…Read More Skybox Security enables proactive vulnerability remediation across hybrid environments
In the wake of the Microsoft Exchange ProxyLogon zero-day and F5 BIG-IP security exploits earlier this year, many are questioning if and when should researchers publish proof of concepts for vulnerabilities and associated patches. Hafnium hackers were …Read More Is it OK to publish PoC exploits for vulnerabilities and patches?
The number of annual credential spill incidents nearly doubled from 2016 to 2020, according to F5 research. There was a 46% downturn in the number of spilled credentials during the same period. The average spill size also declined, falling from 63 mill…Read More Credential spill incidents nearly doubled since 2016