Vulnerability Management: Definition, Process & Tools

As enterprise networks continue to grow in size and complexity, so have the misconfigurations and vulnerabilities that could expose those networks to devastating cyber attacks and breaches. Vulnerability management is the process of prioritizing and minimizing those risks. When you consider that the average Fortune 500 company has nearly 500 critical vulnerabilities, the importance of […]

The post Vulnerability Management: Definition, Process & Tools appeared first on eSecurityPlanet.

March 3, 2023
Read More >>

Red Team vs Blue Team vs Purple Team: Differences Explained

Red, blue and purple teams simulate cyberattacks and incident responses to test an organization’s cybersecurity readiness. Understanding how these teams operate is important for an organization that wants to test its cybersecurity defenses realistically — before an adversary does. The ultimate goal is to understand the advanced threats an organization may face in order to […]

The post Red Team vs Blue Team vs Purple Team: Differences Explained appeared first on eSecurityPlanet.

February 22, 2023
Read More >>

How to Implement a Penetration Testing Program in 10 Steps

Penetration tests find security vulnerabilities before hackers do and are critical for keeping organizations safe from cyber threats. You can either create your own pentesting program or hire an outside firm to do it for you. Penetration test services have become common, with many security companies offering them. But they can be expensive and should […]

The post How to Implement a Penetration Testing Program in 10 Steps appeared first on eSecurityPlanet.

February 21, 2023
Read More >>

What Is Managed Detection and Response? Guide to MDR

Managed detection and response (MDR) goes beyond other managed security services by essentially giving organizations their own expert security analyst team to help identify and respond to cyber threats. The emergence of MDR was in many ways inevitable. Security has become so time-consuming and complex that many organizations have realized, vital though the function is, […]

The post What Is Managed Detection and Response? Guide to MDR appeared first on eSecurityPlanet.

February 17, 2023
Read More >>

Cloudflare Blocks Record DDoS Attack as Threats Surge

Cloudflare mitigated dozens of hyper-volumetric DDoS attacks last weekend, most of them ranging from 50 to 70 million requests per second (RPS) – and the largest one exceeding 71 million RPS. “This is the largest reported HTTP DDoS attack on record, more than 35 percent higher than the previous reported record of 46 million RPS […]

The post Cloudflare Blocks Record DDoS Attack as Threats Surge appeared first on eSecurityPlanet.

February 16, 2023
Read More >>

AI Coding: A Security Problem?

Andrej Karpathy is a former research scientist and founding member of OpenAI. He was also the senior director of AI at Tesla. Lately, he has been using Copilot, which leverages GPT-3 to generate code. He tweeted this about it: “Nice read on reverse engineering of GitHub Copilot. Copilot has dramatically accelerated my coding, it’s hard […]

The post AI Coding: A Security Problem? appeared first on eSecurityPlanet.

February 16, 2023
Read More >>