article thumbnail

7 Best Attack Surface Management Software for 2024

eSecurity Planet

per year Tenable Tenable One, an exposure management platform Identifies assets using DNS records, IP addresses, and ASN, and provides over 180 metadata fields Tenable Attack Surface Management, Add-on for Splunk ISO/IEC 27001/27002 $5,290 – $15,076.50

Software 113
article thumbnail

VulnRecap 2/19/2024: News from Microsoft, Zoom, SolarWinds

eSecurity Planet

The problem: Zoom recently patched a flaw that affected three of its Windows-facing software products: Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows. Appliances with affected software must have Anyconnect SSL VPN enabled on whichever interface is exposed to the internet for an attack to occur.

VPN 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Prevent DNS Attacks: DNS Security Best Practices

eSecurity Planet

Domain name service (DNS) attacks threaten every internet connection because they can deny, intercept, and hijack connections. With the internet playing an increasing role in business, securing DNS plays a critical role in both operations and security. Everything You Need to Know.

DNS 113
article thumbnail

How Cobalt Strike Became a Favorite Tool of Hackers

eSecurity Planet

Pentesting involves vulnerability exploitation and post-exploitation actions – the idea is to conduct a real attack, like cybercriminals would do, except with an explicit authorization from the company in order to identify weaknesses and improve security defenses. Read next: Best SIEM Tools & Software for 2022.

article thumbnail

How To Set Up DMZ on Servers: 7-Step DMZ Configuration

eSecurity Planet

File Transfer Protocol (FTP) servers: Transfer files securely across the internet. Domain Name System (DNS) servers: Translate domain names to IP addresses. Navigate to the control or configuration panel of your specific firewall software and name the DMZ wherever you’re prompted to do so. How Many Firewalls Do You Need?

article thumbnail

What Is a Firewall Policy? Steps, Examples & Free Template

eSecurity Planet

Featured Partners: Next-Gen Firewall (NGFW) Software Learn more Table of Contents Toggle Free Firewall Policy Template What Are the Components of Firewall Policies? Examples include Users, User Groups, Applications, Application Groups, Countries, IPv4/IPv6 Endpoints, Host DNS Names, and more.

Firewall 108
article thumbnail

What is a Managed Security Service Provider? MSSPs Explained

eSecurity Planet

and installed software (operating systems, applications, firmware, etc.). Web browsing security manages internal or local domain name service (DNS), secure web gateways (SWGs), firewall settings, and other techniques, tools, and protocols used to block dangerous or unwanted websites and URLs.