Security Intelligence to Mitigate Vulnerabilities Beyond Patching

Vulnerabilities are often at the center of cyber risk. Once exposed and exploited, threat actors can either access systems or achieve capabilities within systems via privilege escalation — enabling all sorts of nefarious activities that may impact every aspect of your business. Don’t let vulnerabilities stand in the way of your organization’s success. This article […]

Risk Management Best Practices for Third-Party Identities

An ever-growing area of concentration in risk management is identifying and mitigating the risks that third parties introduce to an organization – and perhaps equally important, ensuring that third parties don’t introduce unmeasured risk. One might think that third-party governance systems, sometimes used for vendor assessments, could be used to manage the identity and access […]

Cybersecurity News Headline Updated on 27 June 2020 – Patch Exchange Servers Now, Australia is Under State-Sponsored Cyberattack, and more

The headline on 27 June 2020 Microsoft: Patch Exchange Servers Now. In a recent blog post, the Microsoft Defender ATP Research Team describes a recent increase in attacks targeting Microsoft Exchange servers. The attacks exploit a critical flaw in the Internet Information Service (IIS) component of Exchange servers. Fixes for the vulnerability have been available […]