SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Risk Based Security stories

Story image
WordPress vulnerabilities more than doubled in 2021
Thu, 13th Jan 2022
#
cybersecurity
#
wordpress
#
exploits
WordPress vulnerabilities more than doubled in 2021, and 77% of them are exploitable.
Story image
Vulnerability disclosures back to expected rates despite COVID-19 disruption
Tue, 16th Feb 2021
#
security vulnerabilities
#
risk based security
#
covid-19
The total number of vulnerabilities in 2020 is on track to exceed 2019.
Story image
Gartner: Security leaders must balance risk, trust and opportunity
Wed, 23rd Sep 2020
#
gartner
#
it risk
#
risk
Security and risk leaders must focus on balancing risk, trust and opportunity to help maintain the ability of their organisations to function.
Story image
Almost four million Quidd users have credentials exposed
Wed, 15th Apr 2020
#
cybersecurity
#
cybersafety
#
risk based security
Risk Based Security says the leaked data sets include email addresses, usernames, and bcrypt hashed passwords of 3,954,416 users.
Story image
Puppet launches vulnerability remediation product
Thu, 22nd Aug 2019
#
cybersecurity
#
it automation
#
security vulnerabilities
With vulnerabilities and security breaches on the rise, the latest Puppet product helps IT teams find, prioritise and remediate vulnerabilities.
Story image
SecurityScorecard launches custom security ratings feature
Thu, 22nd Aug 2019
#
securityscorecard
#
risk based security
#
security ratings
Custom Scorecard allows enterprise leaders to better isolate and focus on cybersecurity risk issues by business units and/or subsidiaries.
Story image
OneSpan uses AI to tackle financial account fraud
Wed, 13th Feb 2019
#
ml
#
fintech
#
ai
Its new solution uses machine learning to protect online and mobile channels, as well as meet compliance requirements for transactional risk analysis
Story image
Over 2,300 data breaches disclosed so far in 2018 - report
Mon, 20th Aug 2018
#
phishing
#
cybersecurity
#
gdpr
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.
© 2023 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.