Operations | Monitoring | ITSM | DevOps | Cloud

Vulnerability

Addressing Cybersecurity Challenges in Cloud Computing

Cloud computing offers notable perks to businesses of all sizes. As reported by the CIO Agenda Survey by Gartner, adapting to cloud-based technology is one of the top business priorities. Cloud services assist companies in expanding their abilities. It also helps to reduce the cost of labor and capital expenditures for adapting to new technological solutions like managed third-party risk.

Invisible Armor: Cycle's Behind-the-Scenes Update Guards Against Recent "Leaky Vessels" Container Exploit

At Cycle, we understand the paramount importance of security and the challenges that come with maintaining it. That's why we're proud to share how our proactive approach has not only addressed the recent “Leaky Vessels” container exploit, but has done so in a manner entirely transparent to our customers, and in under 4 hours of the vulnerability being made public.

Protect Against Netscaler Vulnerability CitrixBleed

CitrixBleed, or CVE-2023-4966, is now an infamous security vulnerability affecting Citrix NetScaler that allows attackers to hijack user sessions by stealing session authentication tokens. Unfortunately, it has affected many NetScaler customers including Xfinity, which lost data for 36 million customers as a result of CitrixBleed. There is no way to protect against CitrixBleed by configuring the NetScaler WAF to detect and block it.

The rising trend of Data Breaches and Critical Vulnerabilities in 2023

As the year comes to an end, we are taking a look back on the major data breaches and vulnerabilities that disrupted the security of both small, and large and very important organizations around the world and across all industries. According to a recently published report: As this trend is on the rise, governmental organizations and companies of every size put more emphasis on the security of their systems and networks.

Coffee Talk with SURGe: 12-DEC-2023 Kyivstar Cyberattack, Water Utilities Hacked, Log4j Exploited

Grab a cup of coffee and join Mick Baccio, Katie Brown and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Audra and Katie also competed in a charity challenge to share what they consider to be the largest cyber incident of 2023.

How Automation Can Support Threat Vulnerability Management + Reduce the Attack Surface

Threat vulnerability management, and managing your attack surface, are critical in the battle against cyberattacks. At some point before an successful attack, the internal process to manage threats and prevent access to sensitive data failed. How could they have done things differently? Were they just managing too much, too often, without the resources they needed?

What is Vulnerability Management?

Vulnerability management is a critical aspect of a cybersecurity strategy. It refers to the systematic and ongoing process of identifying, classifying, prioritizing, and addressing security vulnerabilities in a network environment. This proactive approach to network security aims to minimize the risk of exploitation by attackers. Vulnerability management is about staying one step ahead of potential threats.