Definition, implementation, importance and alternatives
Learn about vulnerability remediation, its place and importance in vulnerability management, and differentiate it from vulnerability mitigation and acceptance.
Keep tabs on this proposal from the Biden-Harris Admin
Learn about the cybersecurity strategy announced by the Biden-Harris Administration, specifically, the issues it aims to address and the pillars it is based on.
Disclosure rules proposed by SEC may soon take effect
We briefly present the amendments to cybersecurity-related disclosure rules proposed by the SEC, their potential benefits and costs, and some recommendations.
Why measure cybersecurity risk with our CVSSF metric?
We present some of the flaws of the traditional measure of cybersecurity risk and introduce CVSSF, the risk-exposure-based metric with which we overcome them.
Take care of your apps from cybercriminals on the prowl
Here we talk about mobile apps and some of their possible security risks, as well as what MAST is and how it can contribute to app security.
Advice for firms to comply with the HIPAA Security Rule
NIST published the second revision draft to its SP 800-66. Learn about the most significant changes that are being introduced.
Enhancing cybersecurity across government entities
Learn about the Federal Rotational Cyber Workforce Program Act of 2021 and the State and Local Government Cybersecurity Act of 2021, which were signed into law.
Plans to fund cybersecurity in Latin America and Africa
The U.S. and EU are to fund protection of critical infrastructure in foreign countries, lest China does it first.
Chances are you're vulnerable with Microsoft Office
In this blog post, you can learn what Follina is, how it works, what cyberattacks are linked to it and what you can do as prevention measures.