Let’s Ease Up on the Cyber Criminal High Tech Hype

There's way too much hype about exotic cyber attack vectors...the old ones are working just fine for the bad guys.

It probably makes sense to take the hyperventilating stories of cutting-edge attack vectors with a grain of salt. There will come a day when the primary means of initial penetration become obsolete or are abandoned by the cyber criminal community in favor of something revolutionary. However, the cyber security community – the good guys – will first need to render them ineffective and, unfortunately, we don’t seem to be close to achieving that reality.

Identify Vulnerabilities

Identifying vulnerabilities is the first step in the vulnerability management process.

How Do You Identify Vulnerabilities? There are many tools on the market, and even some that are free of charge, that will enable your security or IT team to identify vulnerabilities. Tenable, Qualys, and Rapid […]