A Maturity Journey: Vulnerability Management

| | cyber-risk
Cybersecurity vulnerabilities are one of the top threats that affect organizations today. In 2020, more than 18,000 vulnerabilities were published in the NVD database — an increase of about 1,000 since 2019. It’s important to note that the database doesn’t account for undiscovered vulnerabilities, which means that the number of ... Read More

Vulnerability Management vs Attack Surface Management

| | cyber-risk
Vulnerability management vs attack surface management: These two management programs can often get confused. After all, both generally deal with the same things and aim to solve and optimize the same problems. Before we dive in, let's look at what each program is encompasses. The post Vulnerability Management vs Attack ... Read More
How can I make my vulnerability solution more responsive?

Ask the Expert: How can I make my vulnerability solution more responsive?

| | cyber-risk
Kirk Hogan, Chief Innovation Officer at Iceberg Networks and Allan Liska, CSRIT at Recorded Future, sat down to answer some questions that they are hearing about how organizations can prepare for all levels of vulnerability, including how to get the best vulnerability prioritization, knowing where to look for vulnerabilities and in fact, if they ... Read More
What is the difference between vulnerability management and attack surface management?

Ask the Expert: What is the difference between vulnerability management and attack surface management?

| | cyber-risk
Kirk Hogan, Chief Innovation Officer at Iceberg Networks and Allan Liska, CSRIT at Recorded Future, sat down to answer some questions that they are hearing about how organizations can prepare for all levels of vulnerability, including how to get the best vulnerability prioritization, knowing where to look for vulnerabilities and in fact, if they ... Read More
How do you level up your vulnerability management?

Ask the Expert: How do you level up your vulnerability management?

| | cyber-risk
Kirk Hogan, Chief Innovation Officer at Iceberg Networks and Allan Liska, CSRIT at Recorded Future, sat down to answer some questions that they are hearing about how organizations can prepare for all levels of vulnerability, including how to get the best vulnerability prioritization, knowing where to look for vulnerabilities and in fact, if they ... Read More
Why is CVSS not enough?

Ask the Expert: Why is CVSS not enough?

| | Best Practices, cyber-risk
Kirk Hogan, Chief Innovation Officer at Iceberg Networks and Allan Liska, CSRIT at Recorded Future, sat down to answer some questions that they are hearing about how organizations can prepare for all levels of vulnerability, including how to get the best vulnerability prioritization, knowing where to look for vulnerabilities and in fact, if they ... Read More
UPCOMING WEBINAR Sweeten up your approach: Vulnerabilities and knowing exactly where to look.

UPCOMING WEBINAR Sweeten up your approach: Vulnerabilities and knowing exactly where to look.

| | cyber-risk, events, ServiceNow
Live webinar November 10, 2021  10:30AM PST / 1:30PM EST SPEAKER: Kirk Hogan, CIO, Iceberg SPEAKER: Allan Liska, CSIRT, Recorded Future (Sweeten up your vulnerability approach and attend this session – following this informative talk, we will add a fun segment, led by a pastry chef, taking you through a ... Read More