Social vulnerability

Tenable Celebrates a Successful Year as deepwatch’s Preferred Risk-Based Vulnerability Management Partner

Retrieved on: 
Thursday, December 3, 2020

COLUMBIA, Md., Dec. 03, 2020 (GLOBE NEWSWIRE) -- Tenable, Inc. , the Cyber Exposure company, today celebrates a successful year as deepwatchs preferred risk-based vulnerability management partner.

Key Points: 
  • COLUMBIA, Md., Dec. 03, 2020 (GLOBE NEWSWIRE) -- Tenable, Inc. , the Cyber Exposure company, today celebrates a successful year as deepwatchs preferred risk-based vulnerability management partner.
  • Were helping customers accelerate their cloud journeys swiftly and securely by combining our industry-leading solutions with deepwatchs elite team of security experts.
  • As their attack surface expands, organizations are increasingly turning to Tenable and its partners to reduce their cyber exposure.
  • After rigorous testing and customer feedback, we determined that Tenable is the gold standard and selected them as our preferred vulnerability management partner, said Charlie Thomas, chief executive officer, deepwatch.

PiiQ Partners With Webhose to Add Human Layer Risk to Partner Risk Assessments

Retrieved on: 
Wednesday, December 2, 2020
Key Points: 
  • View the full release here: https://www.businesswire.com/news/home/20201202005570/en/
    Changing Third Party Risk Management Assessments to include Human Layer Vulnerability Insights in minutes!
  • PiiQ first partnered with Webhose to add its open web monitoring, which includes comprehensive coverage of millions of sites from news, blogs, discussions and reviews.
  • Realizing risk technology that includes the human layer to tabulate risk is pivotal.
  • Partner Risk Assessments and TPRM continue to expand as a top focus to drive security measures forward, however, until now, human layer attack vulnerability was never factored into this risk posture automation.

SingleStore Announces Nucleus Security Win

Retrieved on: 
Monday, November 30, 2020

SingleStore, The Database of NowTM, announced today that it is supporting the Nucleus Security vulnerability assessment software-as-a-service offering for vulnerability management.

Key Points: 
  • SingleStore, The Database of NowTM, announced today that it is supporting the Nucleus Security vulnerability assessment software-as-a-service offering for vulnerability management.
  • Enterprises often overlook threats due to the speed, size and complexity of data, said Nucleus Security CEO Steve Carter.
  • With SingleStore, Nucleus increased the number of scans it can perform in one hour by a factor of 60.
  • Leading organizations such as Toyota rely on Nucleus Security for vulnerability management, said SingleStore CEO Raj Verma.

FoxGuard Solutions Teams Up with Industrial Defender – Transforming Patch and Vulnerability Management for OT Security Teams.

Retrieved on: 
Friday, November 20, 2020

Christiansburg, VA, Nov. 20, 2020 (GLOBE NEWSWIRE) -- Industrial Defender and FoxGuard Solutions, two operational technology (OT) security pioneers, announced a new partnership today that will transform patch and vulnerability management for critical infrastructure companies.

Key Points: 
  • Christiansburg, VA, Nov. 20, 2020 (GLOBE NEWSWIRE) -- Industrial Defender and FoxGuard Solutions, two operational technology (OT) security pioneers, announced a new partnership today that will transform patch and vulnerability management for critical infrastructure companies.
  • The partnership between FoxGuard Solutions and Industrial Defender will simplify and enhance cybersecurity efforts required within ICS environments, says Michael Trautman, CTO & VP Cybersecurity at FoxGuard Solutions.
  • Aligning patch and vulnerability intelligence data with asset information and process driven tools results in a robust solution providing process efficiencies within security teams serving critical infrastructure markets.
  • Our collaboration with FoxGuard Solutions is going to revolutionize patch and vulnerability management for ICS environments, says Jim Crowley, CEO at Industrial Defender.

Kenna Security Named CISO Choice Award Winner for Vulnerability Management

Retrieved on: 
Thursday, November 19, 2020

SAN FRANCISCO, Calif., Nov. 19, 2020 (GLOBE NEWSWIRE) -- Kenna Security , the enterprise leader in risk-based vulnerability management has won the CISO Choice Award for Vulnerability Management from Security Current.

Key Points: 
  • SAN FRANCISCO, Calif., Nov. 19, 2020 (GLOBE NEWSWIRE) -- Kenna Security , the enterprise leader in risk-based vulnerability management has won the CISO Choice Award for Vulnerability Management from Security Current.
  • Kenna Security was selected as the winner of the Vulnerability Management category for its leading risk-based vulnerability management solution.
  • Honoring security vendors of all types, sizes and maturity levels, the CISO Choice Awards recognizes differentiated solutions valuable to the CISO and enterprise from security solution providers worldwide.
  • Kenna Security is the enterprise leader in risk-based vulnerability management.

MedCrypt's Software Bill of Materials and Vulnerability Tracking Solution to Enhance Security for Accuray Radiation Treatment Delivery Systems

Retrieved on: 
Tuesday, November 17, 2020

SAN DIEGO, Nov. 17, 2020 /PRNewswire/ -- MedCrypt Inc. , the leading provider of proactive security solutions for the healthcare space, today announced Accuray has chosen MedCrypt's Software Bill of Materials (SBOM) and Vulnerability Tracking Software, Heimdall, to help enhance monitoring the digital security posture of the company's portfolio of radiation treatment delivery, planning, and data management solutions.

Key Points: 
  • SAN DIEGO, Nov. 17, 2020 /PRNewswire/ -- MedCrypt Inc. , the leading provider of proactive security solutions for the healthcare space, today announced Accuray has chosen MedCrypt's Software Bill of Materials (SBOM) and Vulnerability Tracking Software, Heimdall, to help enhance monitoring the digital security posture of the company's portfolio of radiation treatment delivery, planning, and data management solutions.
  • "Our solution gathers critical vulnerability data from the National Vulnerability Database, giving us an accurate rundown of potential exposures, so we can respond quickly if a problem is found.
  • With MedCrypt focused on the security aspect, Accuray can focus on their clinical expertise."
  • MedCrypt's Heimdall software will compare these systems' SBOM to the National Vulnerability Database from the National Institute of Standards and Technology to identify known software vulnerabilities.

Nucleus and Recorded Future Partner to Unite Vulnerability Scan Results and Threat Intelligence

Retrieved on: 
Tuesday, November 17, 2020

SARASOTA, Fla., Nov. 17, 2020 /PRNewswire-PRWeb/ --Nucleus, the unified vulnerability management solution that brings disparate security tools together, today announced a new partnership with Recorded Future to automate and correlate findings from vulnerability scan results with threat intelligence feeds.

Key Points: 
  • SARASOTA, Fla., Nov. 17, 2020 /PRNewswire-PRWeb/ --Nucleus, the unified vulnerability management solution that brings disparate security tools together, today announced a new partnership with Recorded Future to automate and correlate findings from vulnerability scan results with threat intelligence feeds.
  • The integration will allow joint clients to leverage Recorded Future data inside Nucleus, adding valuable threat context and scoring alongside insights and information gleaned from vulnerability scans in one view.
  • "This partnership is the first-of-its-kind to bring third-party threat intelligence alongside the vulnerability picture, automating what was once a painfully manual process," said Stephen Carter, CEO and Co-founder of Nucleus.
  • Recorded Future arms threat analysts, vulnerability management teams, security operations centers, and incident responders with context-rich, actionable intelligence in real time that's ready for integration across the security ecosystem.

NopSec Releases the 2020 State of Vulnerability Risk Management Report

Retrieved on: 
Monday, November 16, 2020

"NopSec continues to explore new data, methods and techniques to better understand and prioritize vulnerability data," notes NopSec's CTO, Michelangelo Sidagni.

Key Points: 
  • "NopSec continues to explore new data, methods and techniques to better understand and prioritize vulnerability data," notes NopSec's CTO, Michelangelo Sidagni.
  • "Our mission is to empower cyber security and risk professionals to make better decisions to reduce their cyber risk exposure.
  • In this sense, not all vulnerabilities are created equal."
  • NopSec provides ML-based threat prediction and cyber risk remediation solutions to make data digestible, actionable and cut down time to remediation.

Natural Disasters Are Breeding Ground for Cyber Looters

Retrieved on: 
Thursday, October 29, 2020

The company has developed a web-based resource comprising data and advice to help companies prepare for and mitigate against risks created due to natural disasters and prepare for the cyber looters that prey on companies during these events.

Key Points: 
  • The company has developed a web-based resource comprising data and advice to help companies prepare for and mitigate against risks created due to natural disasters and prepare for the cyber looters that prey on companies during these events.
  • If that werent hardship enough, the truth is that while businesses struggle to survive through natural disasters, there is a dark force at work looking to reap even more harm.
  • These are the bad actors using these incidents to try and create cyber vulnerability in the form of phishing and ransomware attacks.
  • After all, its human nature to click on a link to a charity supporting people impacted by natural disasters; or a link that seems official to local government support.

Tidelift Delivers Open Source Vulnerability Data to Subscribers with Sonatype

Retrieved on: 
Thursday, October 29, 2020

BOSTON, Oct. 29, 2020 /PRNewswire/ -- Tidelift , the largest provider of commercial support and maintenance for the community-led open source behind modern applications, and Sonatype , a leading provider of open source intelligence, today announced that Tidelift has integrated Sonatype's OSS Index data into the Tidelift Subscription to help developers more quickly identify and remediate security vulnerabilities in open source packages and libraries managed by Tidelift.

Key Points: 
  • BOSTON, Oct. 29, 2020 /PRNewswire/ -- Tidelift , the largest provider of commercial support and maintenance for the community-led open source behind modern applications, and Sonatype , a leading provider of open source intelligence, today announced that Tidelift has integrated Sonatype's OSS Index data into the Tidelift Subscription to help developers more quickly identify and remediate security vulnerabilities in open source packages and libraries managed by Tidelift.
  • Over 92% of software applications today contain open source components and, due to the economic downturn resulting from the global pandemic, 42% of organizations are likely to accelerate their use of open source .
  • Sonatype's OSS Index vulnerability data provides developers with foundational vulnerability information and the ability to better identify and remediate security risks for components managed by Tidelift.
  • OSS Index contains aggregate data from a variety of vulnerability information sources, including:
    A growing list of public vulnerability sources;
    "In a recent Tidelift survey, 58% of the respondents cited 'identifying and resolving open source security vulnerabilities' as a key issue," said Matt Rollender, Head of Partnerships, Tidelift.