Category: Threat & Vulnerability Management

Master threat and vulnerability management with expert insights. Learn about vulnerability scanning, threat modeling, risk prioritization, and remediation best practices to stay ahead of cyber threats.

  • Vulnerability Scanning vs. Patch Management: What’s the Difference?

    Vulnerability Scanning vs. Patch Management: What’s the Difference?

    In September 2017, Equifax, a consumer credit reporting agency, has suffered a major data breach that exposed the personal data of 148 million American consumers. This data breach is related to the “critical vulnerability” in the Apache Struts software that was publicly disclosed in March 2017. According to a report by the U.S. House Committee on Oversight and Reform released in December of 2018, “Equifax used Apache Struts to run certain applications on legacy operating systems. The following day, the Department of Homeland Security alerted Equifax to this critical vulnerability.”

    On March 9, the Global Threat and Vulnerability Management team of Equifax sent this alert via email to more than 400 individuals. They told anyone who had Apache Struts to apply the necessary patch within 48 hours.

    Equifax, however, didn’t apply the necessary patch. This led to the exposure of their system and data for 76 days. The report implies the need for any business to reinforce, emphasize and enhance the vulnerability scanning and patch management processes and procedures.

    Vulnerability scanning and patch management are two terms that are seemingly identical, but that is not the case. While they have a compatible relationship, they are not the same. It is important for a business to learn the difference between these terms or else it could suffer from a cybersecurity attack similar to that of Equifax.

    Let’s define these two terms and see the difference.

    (more…)

  • 5 Cyber Security Threats In The Cannabis Industry

    5 Cyber Security Threats In The Cannabis Industry

    The legal marijuana industry is expected to grow exponentially over the next few years. This is spurred not only by the legalization of recreational marijuana in many states in the US as well as in countries like Canada, but also the growing adoption of cannabis as a pharmaceutical product.

    According to the State of the Legal Cannabis Markets report from BDS Analytics and Arcview Market Research, legal pot sales will hit $40.6 billion in 2024. This represents a 24.5 percent growth over the period 2018 to 2024. 

    The burgeoning cannabis retail industry is, therefore, a prime target for cybercriminals who look to steal valuable and sensitive information ranging from credit card information, trade secrets, and personally identifiable information (PII)

    Aside from the consumer information they store and manage, online cannabis retailers are being targeted because many of them have yet to incorporate cybersecurity practices.  Small to medium-sized online marijuana retailers are also highly vulnerable to cyberattacks because they normally don’t have the resources to hire an IT staff who can implement security measures to mitigate cybersecurity risks. 

    (more…)

  • Shadow IT Risk: Q&A with Cybersecurity Expert Sai Huda

    Shadow IT Risk: Q&A with Cybersecurity Expert Sai Huda

    When it comes to cybersecurity risk, it’s easy to overlook one of the primary targets that hackers are starting to go after: your own employees. More specifically, cyber criminals are now going after what’s known as companies’ “Shadow IT” ecosystem, hacking into software and apps employees use without the approval and/or knowledge of your IT department.

    According to Gartner, by 2020 approximately one-third of successful enterprise cyber-attacks will be on data and systems located in shadow IT resources. And that’s not to mention the regulatory compliance risks that organizations run by having sensitive data potentially being handled, transferred, and passed around on apps that may or may not have the proper security measures.

    I recently caught up with globally recognized cybersecurity expert and author Sai Huda to help demystify shadow IT, explain the true risks that shadow IT presents, and provide IT leaders with sound strategies to tackling shadow IT within their organizations.

    (more…)

  • How to Build an Effective Vulnerability Management Program

    How to Build an Effective Vulnerability Management Program

    Vulnerabilities can wreak havoc on your network if you don’t take the necessary precautions to combat them. Having a robust cybersecurity program in place that is focused on vulnerability management can help your organization stay on top of potential security risks before they happen.  

    (more…)