Remove Authentication Remove Security Remove Vulnerability
article thumbnail

Cybersecurity Tips: Risk and Vulnerability Management

Security Industry Association

Managing cybersecurity risks and vulnerabilities is a critical activity for any robust security program. Risk management and vulnerability management are performed in tandem to help keep your network safer and more secure. What Is Security Risk Management? What Is Security Risk Management?

article thumbnail

How Citrix Web App Firewall can help mitigate risk of authentication bypass vulnerability

Citrix

Citrix has crafted new signatures and has updated its Citrix Web App Firewall signature file to help customers mitigate the recent authentication bypass vulnerability in multiple versions of Atlassian Confluence app (versions prior to 2.7.38 and 3.0.5).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. What Is the Log4j Vulnerability?

article thumbnail

Trust the Source: Why Authenticating Video Data Is Essential

Security Industry Association

Artificial intelligence (AI) has had a big impact on the video surveillance and security sectors over the past year automating tasks such as threat detection, object recognition and predictive analytics with better accuracy than ever. These advancements have been essential tools to help empower security teams.

article thumbnail

Guidance for reducing HTTP protocol RCE security vulnerability risk with Citrix Web App Firewall (CVE-2022-21907)

Citrix

The HTTP protocol stack remote code execution vulnerability (CVE-2022-21907) lies in the management of HTTP Trailers by the kernel mode driver http.sys.

article thumbnail

Seven principles of the zero trust security model

Citrix

The reality of today’s fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches. … The post Seven principles of the zero trust security model first appeared on Citrix Blogs. Related Stories Why should you evolve your multi-factor authentication to adaptive authentication?

article thumbnail

Citrix Endpoint Management now supports NetScaler advanced authentication policies (nFactor)

Citrix

That’s why we are excited to announce general availability … The post Citrix Endpoint Management now supports NetScaler advanced authentication policies (nFactor) first appeared on Citrix Blogs. Mitigating risk from Cambium Networks cnMaestro SQL injection vulnerability