Background Businesses the world over are facing a growing threat of cyber-attacks, with the number of incidents increasing year-on-year in both scale, complexity and impact. One of the major ways… Read More »How crypto-currencies professionalised hacking.
Many organisations may have well defined security policies and processes in place. Processes that respond to vulnerabilities, alerts, and other security gaps in their network and software infrastructure. But these… Read More »Brinqa Risk Based Vulnerability Management for Enterprise Organisations.
Based upon extensive work with enterprise customers we have compiled a list of eight best practice steps. Follow them for an effective vulnerability management programme. S4 Applications takes a ‘security-by-design’… Read More »8 best practice steps for effective Vulnerability Lifecycle Management.
Dealing with cyber-attacks, data breaches and other cyber security issues is something most organisations don’t generally take lightly.
Many businesses react only when they have a problem, there is a better way – by using risk based vulnerability management.Read More »Staying safe with Risk Based Vulnerability Management.
Security is a journey or process, not a thing. It’s not possible to be completely “secure”, but you can become “more secure”. As an organisation goes through a security journey, it can continually improve and enhance its security posture, which it “matures”, hence “security maturity”.