remediation

Hybrid Systems: AI and Humans Need Each Other for Effective Cybersecurity
The sudden mainstreaming of chatbots and generative AI like ChatGPT has a lot of people worried. They believe this is the AI technology that will replace them. Fortunately, that’s not actually the ...
Containment, Communication, and Remediation: The 3 Keys to a Breach Response
The number of U.S. data breaches reported in 2021 increased dramatically over the preceding year. As reported by the Identity Theft Resource Center (ITRC), there were 1,291 data breaches between January 1, ...

UPDATED: Cybereason Log4Shell Vaccine Offers Permanent Mitigation Option for Log4j Vulnerabilities (CVE-2021-44228 and CVE-2021-45046)
UPDATE 12/17/21: The Logout4Shell Vaccine has been updated to add a persistent option in addition to the existing one which reverted upon server restart. The previous version of the Vaccine used the ...

UPDATED: Cybereason Log4Shell Vaccine Offers Permanent Mitigation Option for Log4j Vulnerabilities (CVE-2021-44228 and CVE-2021-45046)
UPDATE 12/17/21: The Logout4Shell Vaccine has been updated to add a persistent option in addition to the existing one which reverted upon server restart. The previous version of the Vaccine used the ...

THREAT ALERT: Microsoft MSHTML Remote Code Execution Vulnerability
The Cybereason Global Security Operations Center (SOC) issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them ...

Cloud Auto-Remediation and Enforcement with Tripwire Configuration Manager
Determining the security posture for an increasing quantity of cloud accounts and services used by many organizations can feel overwhelming, but Tripwire Configuration Manager can help you find, fix, and even enforce ...
Developers, Rejoice: Auto-Remediation Now Available in Eclipse, IntelliJ, and Visual Studio
We're excited to announce a new feature within Nexus Lifecycle and Nexus Firewall: auto-remediation. As part of Sonatype’s commitment to empowering developers with the ability to remediate quickly and easily, we’re continuing ...

Protect Before You Detect: FlawedAmmyy and the Case for Isolation
Posted by Ratnesh Pandey, Alex Holland and Toby Gray. In June 2019, Microsoft issued warnings about a phishing campaign delivering a new variant of the FlawedAmmyy remote access Trojan (RAT), and a ...
Vulnerability Management Metrics: The Final Frontier
In Part 1 of this series, we looked at some of the metrics that an executive team would want to see to identify how the business risk is trending. It is very ...
Turning Data into Metrics: A Vulnerability Management Story
One of the main issues I find across the information security industry is that we constantly need to justify our existence. Organizations have slowly realized they need to spend on IT to ...