| Sep 15, 2020 How to Leverage Your SIEM to Detect and Respond to Ransomware The key to detecting ransomware is laying the necessary groundwork first. Avertium explores how to leverage SIEM technology to respond to attacks.
| Sep 14, 2020 Palo Alto Firewall vulnerabilities discovered and patched This threat report is about a series of Palo Alto firewall vulnerabilities in the software suite ranging in criticality.
| Sep 9, 2020 Why Enterprises are Adding Chief Privacy Officer to C-Level Leadership Learn why the Chief Privacy Officer is needed for personal data privacy strategic decision making and why the CPO is here to stay.
| Sep 8, 2020 Assessing whether you need Virtual CISO (vCISO) Services, and what to expect Learn if you need virtual CISO (vCISO) services for cybersecurity leadership to improve security and meet regulations and compliance.
| Sep 3, 2020 The Cybersecurity Talent Shortage: Myth or Truth? Explore the myths and facts surrounding the cybersecurity talent shortage and what you can do about it with MSSP and consulting.
| Sep 1, 2020 Vulnerability Management: Is In-Sourcing or Outsourcing right for you? Examine the different components of vulnerability management and when and where outsourcing makes sense to your program.
| Aug 31, 2020 WooCommerce vulnerabilities in WordPress plugin discovered This threat report provides actionable intelligence about WooCommerce vulnerabilities discovered in Discount Rules in the WordPress plugin.
| Aug 27, 2020 Attributes of a robust Vulnerability Management Program The attributes of a robust vulnerability management program that protects enterprises in a challenging security environment.
| Aug 25, 2020 Importance Of Vulnerability Assessments (Do You Need One?) Since a vulnerability assessment is designed to identify the flaws in software that an attacker can exploit, any organization can benefit. Learn more!
| Aug 24, 2020 MassLogger Malware This threat report provides an overview of the MassLogger malware, the tactics, techniques and procedures, and what you can do to protect your organization.