article thumbnail

Carsten Fischer: The Need for Speed in Threat Mitigation

FS-ISAC

The Need for Speed in Threat Mitigation There used to be weeks between the announcement of a zero-day vulnerability and the next exploit. Now we have days or hours to patch the vulnerability, says Carsten Fischer, Deputy Chief Security Officer at Deutsche Bank.

article thumbnail

Mitigating risk from Cambium Networks cnMaestro SQL injection vulnerability

Citrix

Cambium Networks has issued upgrade packages for their on-premises cnMaestro product for fixing a vulnerability which allowed a pre-auth data exfiltration through improper neutralization of special elements used in an SQL statement.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Get Strong: Unlocking the Power of Vulnerability Management

MHA Consulting

Vulnerability management is the practice of identifying and mitigating the weaknesses in an organization’s people, processes, and technology. Then we work with the client on devising a plan to mitigate those weaknesses—and do all we can to get them to follow through on the plan (otherwise, what’s the point?).

article thumbnail

How Citrix Web App Firewall can help mitigate risk of authentication bypass vulnerability

Citrix

Citrix has crafted new signatures and has updated its Citrix Web App Firewall signature file to help customers mitigate the recent authentication bypass vulnerability in multiple versions of Atlassian Confluence app (versions prior to 2.7.38 and 3.0.5).

article thumbnail

Mitigating risk from Cambium Networks cnMaestro SQL injection vulnerability

Citrix

Cambium Networks has issued upgrade packages for their on-premises cnMaestro product for fixing a vulnerability which allowed a pre-auth data exfiltration through improper neutralization of special elements used in an SQL statement.

article thumbnail

What is Vulnerability Management?

Acronis

Explore the essentials of vulnerability management in this insightful overview. Understand its importance in cybersecurity, learn about identifying, assessing, and mitigating risks, and discover how to fortify your digital defenses effectively.

article thumbnail

Who’s the Boss? Successful Risk Mitigation Requires Centralized Leadership

MHA Consulting

Many companies spend millions of dollars implementing risk mitigation controls but are kept from getting their money’s worth by a disconnected, piecemeal approach. Successful risk mitigation requires that a central authority supervise controls following a coherent strategy. Related on MHA Consulting: Global Turmoil Making You Ill?