How to Use Vulnerability Assessment to Quantify & Reduce Cyber Risk

by Matt Miller  | 

Vulnerability assessment refers to the process of identifying and analyzing cyber risks and vulnerabilities in computer networks, systems, hardware, applications, and other IT assets, both on premise and in the cloud. Vulnerability assessments provide security teams and other stakeholders with the information they need to assess and prioritize risks for potential remediation in the proper context. This blog will cover the basics of vulnerability assessments, including how they help identify and reduce cyber risk, and how they complement other components of the vulnerability management framework.

Password Cycling Versus Recycling: One is a Cybersecurity Best Practice, the other, a Taboo

by Morey Haber  | 

In the realm of information technology and cybersecurity, we recycle all the time in the name of efficiency and cost-effectiveness. However, password recycling—the re-use of credentials—introduces a quantifiable risk and is a security taboo.

Breaking Up with Obsolete Cybersecurity Practices

by Morey Haber  | 

Some cybersecurity best practices withstand the test of time, remaining unaltered after the passing of decades. Other IT security recommendations have proven more fickle, evolving over fairly short stretches of time to reflect changes in attack vectors, technology stacks, security maturity models, or simply, just better data on what works and what doesn’t. Let’s review some security policies once regarded as best practices, but that it’s now time to break up with. Then, I’ll discuss how to get your employees to unlearn outdated security practices too.