Remove state-of-security why-security-configuration-management-matters
article thumbnail

Why Security Configuration Management (SCM) Matters

The State of Security

This lesson Vito Corleone taught his son Michael is just as applicable to IT security configuration management (SCM). The post Why Security Configuration Management (SCM) Matters appeared first on The State of Security.

article thumbnail

Fix Less, Secure More: Why You Should Put Vulnerability Prioritization First

NopSec

NopSec has been in the risk-based vulnerability management (RBVM) game for 10 years now. To celebrate our ten year anniversary and call this fact to attention, we are changing our company’s slogan to “Fix Less, Secure More.” Fix less, secure more should be the goal of every Vulnerability Management team.

Risk 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Will 5G Technology Alter IoT Security And How Can We Prepare?

CyberSecurity Insiders

As an increasing number of companies plan to implement 5G mobile networks on a large scale, organizations need to consider the security risks that the technology can pose. This article explores the possible ramifications that 5G could have for IoT security, along with some steps that enterprises can take to prepare for it.

IoT 131
article thumbnail

Onapsis Named Gold Winner in ‘ASTORS’ Homeland Security Awards

Security Boulevard

Onapsis Named Gold Winner in ‘ASTORS’ Homeland Security Awards. We’re thrilled to announce we are the recipient of a 2022 ‘ASTORS’ Homeland Security Award for our vulnerability management solution, Onapsis Assess. . American Security Today’s Annual ‘ASTORS’ Awards is the preeminent U.S. Mon, 11/28/2022 - 16:00.

InfoSec 52
article thumbnail

Home Assistant, Pwned Passwords and Security Misconceptions

Troy Hunt

— Patrick Bulteel (@PBulteel) March 10, 2021 I read through this thread earlier today and some of it is fair, namely that it should be configurable. This is why Zero Trust has become such a buzzword in recent years. Two of my favourite things these days are Have I Been Pwned and Home Assistant.

Passwords 350
article thumbnail

Preparing for Ransomware: Are Backups Enough?

eSecurity Planet

As ransomware threats loom, we look at where backups fall short, and what to keep in mind to optimize network and data security. Why Are Backups Critical? Backups are the specialized physical or virtual machines built to restore an organization’s data or systems to a previous state. The Argument for Backups.

Backups 108
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

I also looked at custom firmware and soldering and why, to my mind, that was a path I didn't need to go down at this time. I also looked at custom firmware and soldering and why, to my mind, that was a path I didn't need to go down at this time. Now for the big challenge - security. Let's dive into it.

IoT 358