Crane lifting Scala onto Code Property Graph to conduct vulnerability analysis

Crane lifting Scala onto Code Property Graph to conduct vulnerability analysis

Image Courtesy : https://www.huismanequipment.com/The Scala language has continued to gain popularity over the last several years, thanks to its excellent combination of functional and object-oriented software development principles, and its implementation on top ...

VERT Threat Alert: October 2020 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s October 2020 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-909 on Wednesday, October 14th. In-The-Wild & Disclosed CVEs CVE-2020-16938 ...
Monitoring and Vulnerability Management

Monitoring and Vulnerability Management

 (Cross posted from the Securonix Blog)Vulnerability management is one of the most basic security hygiene practices organizations must have in place to avoid being hacked. However, even being a primary security control ...
3 Years Later: The Equifax Breach

3 Years Later: The Equifax Breach

On September 7, 2017, Equifax issued a breach notification. What was breached? Personal records for a staggering 145 million Americans, including Social Security Numbers, birth dates, addresses, and more. Before the end ...

Cómo madurar un programa de gestión de vulnerabilidades

El panorama global de ciber-amenazas se encuentra en constante evolución lo cual resalta la necesidad emergente de que las organizaciones fortalezcan su capacidad para identificar, analizar y evaluar los riesgos tecnológicos antes ...
You’re Going to Want to Patch CVE-2020-1472 (Zerologon) ASAP

You’re Going to Want to Patch CVE-2020-1472 (Zerologon) ASAP

CVE-2020-1472, aka “Zerologon,” is making the news this week as a particularly troubling vulnerability. So troubling, in fact, that the US Department of Homeland Security has issued a directive that all Federal ...
What is Risk Acceptance and How Does it Work?

What is Risk Acceptance and How Does it Work?

Balbix enables security, and IT teams to accomplish many vital jobs, including assessing and reporting on breach risk and keeping systems patched. A big part of these strategic-level jobs is to accurately ...

The History of Common Vulnerabilities and Exposures (CVE)

During the late 1990s, security professionals were using information assurance tools in concert with vulnerability scanners to detect and remove vulnerabilities from the systems for which they are responsible. There’s just one ...
Setting Up a Hacker-Proof Infosec Team

Setting Up a Hacker-Proof Infosec Team

What’s the rockstar CISO’s favorite song? Smells like Team Spirit! Cheesy jokes aside, if you are or wish to be a rockstar CISO you know that you can’t do it alone. You ...
The 20 Most Severe CVEs in Microsoft’s September 2020 Patch Tuesday Update

The 20 Most Severe CVEs in Microsoft’s September 2020 Patch Tuesday Update

Fresh off the three day Labor Day weekend, many of you are dealing with the September 2020 release of Microsoft’s monthly Patch Tuesday updates. There are 129 updates in this month’s roll-up, ...