September 25, 2018 | Content Aggregator - Single Slide | Vulnerability Assessment and Management
Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.
Theft of cryptocurrency from exchanges and infrastructure climbed to $950 million in 2018 at an 84% compound annual growth rate (CAGR) from 2016. More than three-and-a-half times more cryptocurrency was stolen from exchanges in 2018 than in 2017.
Integrating a vulnerability scanner with a configuration management database (CMDB) can help streamline operations, but what does and doesn't work for such integrations? In this Ask-an-Expert written response, IANS Faculty Marcus Ranum explains the process and offers tips for success.
What are the best solutions for on-premises DDoS mitigation? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford explains the pros/cons of the Top 3 vendors – Radware, Arbor and F5 – and details the latest trends in the space.