Developers, Rejoice: Auto-Remediation Now Available in Eclipse, IntelliJ, and Visual Studio

Developers, Rejoice: Auto-Remediation Now Available in Eclipse, IntelliJ, and Visual Studio

We're excited to announce a new feature within Nexus Lifecycle and Nexus Firewall: auto-remediation. As part of Sonatype’s commitment to empowering developers with the ability to remediate quickly and easily, we’re continuing ...
Protect Before You Detect: FlawedAmmyy and the Case for Isolation

Protect Before You Detect: FlawedAmmyy and the Case for Isolation

Posted by Ratnesh Pandey, Alex Holland and Toby Gray. In June 2019, Microsoft issued warnings about a phishing campaign delivering a new variant of the FlawedAmmyy remote access Trojan (RAT), and a ...

Vulnerability Management Metrics: The Final Frontier

In Part 1 of this series, we looked at some of the metrics that an executive team would want to see to identify how the business risk is trending. It is very ...

Turning Data into Metrics: A Vulnerability Management Story

One of the main issues I find across the information security industry is that we constantly need to justify our existence. Organizations have slowly realized they need to spend on IT to ...
Navigation Apps: Leading the Way? Or Following You?

Navigation Apps: Leading the Way? Or Following You?

In the United States alone, 84% of adults are using navigation applications, according to a recent Gallup poll. Whether they’re downloading it in an app store or the navigation capability is already ...
So you’ve been asked to start a threat intel program

So you’ve been asked to start a threat intel program

What are the bumps in the road you can expect and avoid when setting up a threat intel progarm for your business? Categories: Business How-tos Tags: remediationThreat Intel (Read more...) The post ...