- Cisco bug lets anyone login to network as admin with a blank password
- Intel ships new Spectre patches: Kaby Lake and Coffee Lake now, Sandy Bridge next
- As NDB kicks in, be careful of overcompensating for past security inaction
- On the eve of game-changing NDB scheme, 59 percent of businesses still don’t understand it
- Google reveals kernel, Windows 10 security bypasses fixed in February’s Patch Tuesday
It’s Time for a Smarter Approach: Threat-Centric Vulnerability Management
Your approach to vulnerability management may be putting your organisation at greater risk. Just dealing with vulnerabilities that a vendor said were “critical” isn’t enough and may still leave you susceptible to an attack. Attackers are embracing ransomware and other forms of distributed cybercrime made readily available as packaged exploit kits and services on the dark web. These attacker tools target low–hanging fruit by exploiting a surprisingly small number of vulnerabilities, many of which wouldn’t be tagged as a high priority in a purely vulnerability–centric approach.