Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Comprehensive Approach to IT Vulnerability Management | Sedara Cyber Talks

In this insightful session, David Frier shares a comprehensive approach to IT vulnerability management, offering strategies to go beyond basic vulnerability identification. Learn how to enhance, risk-rank, and prioritize vulnerabilities for optimal remediation efforts.

DSPM vs DLP: Unraveling the Differences

In this episode of Into the Breach, James Purvis and Drew Russell discuss the key differences between Data Loss Prevention (DLP) and Data Security Posture Management (DSPM). Drew explains that while DLP focuses on perimeter security, DSPM secures data at rest, offering a more proactive approach. Using a clever analogy, Drew illustrates how DSPM prevents issues before they occur, unlike DLP's reactive measures. They conclude by highlighting how both can work together to enhance data security.

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching

There is no doubt about the value of conducting Managed Vulnerability Scanning. Trustwave has posted multiple blogs on the topic, (just check here, here, and here) for a look at how Trustwave approaches this very important cybersecurity procedure. One point we have not covered is exactly what kind of vulnerabilities Trustwave SpiderLabs’ analysts find during a scan. Are they truly dangerous? What would happen if the client had opted to give a pass to an MVS occurrence?