Category Archives: Vulnerability Management

Climbing the Vulnerability Management Mountain: Taking the First Steps Towards Enlightenment

Just as you would map a hike or climb by creating waypoints you plan to hit each day, you must plan your vulnerability management process by creating similar goals. We call these goals Maturity Levels, from ML0 to ML5, as we defined them in the last blog. You have your asset inventory from an open-source […]… Read More

The post Climbing the Vulnerability Management Mountain: Taking the First Steps Towards Enlightenment appeared first on The State of Security.

How to Build a Mature Vulnerability Management Program

The evolution of the cyber threat landscape highlights the emerging need for organizations to strengthen their ability to identify, analyze and evaluate cyber risks before they evolve into full-fledged security incidents. When it comes to cyber risk mitigation, the terms “patch management” and “vulnerability management” are used as if they are interchangeable. This is absolutely […]… Read More

The post How to Build a Mature Vulnerability Management Program appeared first on The State of Security.

Attackers are weaponizing more vulnerabilities than ever before

2018 had the most weaponized vulnerabilities ever (177), which represents a 139% increase compared to 2017, according to the RiskSense latest report. In addition, the rate of exploits discovered in the wild before a patch was available was nearly three times higher last year than the previous record set in 2010. The RiskSense Vulnerability Weaponization Insights Report provides an in-depth analysis of vulnerabilities and weaponization patterns across the Adobe family of products from August 1996 … More

The post Attackers are weaponizing more vulnerabilities than ever before appeared first on Help Net Security.

Managed Vulnerability Management? Yes, You Read That Right

The importance of a mature vulnerability management program can’t be overstated. File integrity monitoring (FIM) and security configuration management (SCM) might be the bedrock of a strong cybersecurity program, but they can only go so far. Scanning for vulnerabilities needs to be a foundational part of your program, too. The Center for Internet Security (CIS) […]… Read More

The post Managed Vulnerability Management? Yes, You Read That Right appeared first on The State of Security.

VERT Threat Alert: April 2019 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s April 2019 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-825 on Wednesday, April 10th. In-The-Wild & Disclosed CVEs  CVE-2019-0803 This CVE describes a privilege escalation vulnerability in Win32k that could allow an attacker to execute code in kernel mode, giving them full […]… Read More

The post VERT Threat Alert: April 2019 Patch Tuesday Analysis appeared first on The State of Security.

Vulnerability Management: Myths, Misconceptions and Mitigating Risk

Vulnerability Management is a much-talked-about practice in the IT security industry. Whether it is the debate on vulnerability scoring, how to implement a suitable vulnerability management program based on your own resources or even trying to convince leadership a vulnerability management solution alone won’t solve all your cybersecurity issues, the debate is still strong. To […]… Read More

The post Vulnerability Management: Myths, Misconceptions and Mitigating Risk appeared first on The State of Security.