Remove asset-management-system-faq
article thumbnail

April’s Patch Tuesday Brings Record Number of Fixes

Krebs on Security

Only three of April’s vulnerabilities earned Microsoft’s most-dire “critical” rating, meaning they can be abused by malware or malcontents to take remote control over unpatched systems with no help from users.

DNS 246
article thumbnail

Risk-Based Vulnerability Management: Efficient + Effective

NopSec

We described in the previous blog post the difference between vulnerability management and risk management. Risk-based vulnerability management (RBVM) combines the knowledge gained by looking closely at each category to optimize a security team’s efforts. FAQs: Question: What is risk-based vulnerability management ?

Risk 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Creating a Vulnerability Management Program – Vulnerability Remediation: More Complex than You Might Imagine

NopSec

In prior blogs, we’ve spelled out how an organization finds its vulnerabilities and how security teams consider threat intelligence to determine overall risk. Sure, for a very small organization with few assets to protect, remediation isn’t terribly complex. Once the danger is understood, the next step, of course, is to contain it.

Risk 40
article thumbnail

Creating a Vulnerability Management Program – Cybersecurity Risk: Why You Need Both Vulnerability and Threat Assessments

NopSec

In this blog, we’ll add to our cybersecurity considerations the concept of threats and threat intelligence. So far, we’ve looked at assets and their vulnerabilities. What a cybersecurity team is striving for is understanding and managing the risks their organization faces. The list of them is just the start.

Risk 40
article thumbnail

Creating a Vulnerability Management Program – Patching: Take the Panic out of Patching by Managing CVE Threat Overload

NopSec

And those CVEs that seemed so manageable when the company started have multiplied nearly five-fold, reaching 20,149 in 2021. Understand Patch Management for CVE Threats Patch Management is the system you use to ensure your networks and the devices connecting to your networks are, and remain, secure by keeping them up to date.

article thumbnail

Understanding the Difference Between Vulnerabilities and Exposures

NopSec

The cybersecurity world talks a lot about “ common vulnerabilities and exposures ” (CVEs) and compiles ongoing lists of them with a CVE numbering system. Effective risk management involves understanding and tracking this list and taking precautionary measures against cyber threats as a result. So let’s jump in. What is a Vulnerability?