vulnerability management

Artificial Intelligence

ServiceNow Buys Armis for $7.75B in Major Cybersecurity Deal

ServiceNow is acquiring cybersecurity firm Armis for $7.75 billion to enhance its security workflow capabilities with proactive, AI-driven management for…

Read More »
AI & Tech

ImmuniWeb Boosts AI-Powered Security Testing & Compliance

ImmuniWeb's Q4 update focuses on identifying AI-specific vulnerabilities, including the OWASP Top 10 for LLMs, and expands capabilities for detecting…

Read More »
BigTech Companies

Android’s December 2025 Security Patch: A Major Update

Google's December 2025 Android Security Bulletin details numerous critical vulnerabilities, including a severe flaw in the Android Framework that could…

Read More »
Artificial Intelligence

Terra Security Launches Continuous Exploitability Validation for CTEM

Terra Security has launched a continuous exploitability validation solution to help organizations determine if detected vulnerabilities are actually exploitable within…

Read More »
Business

Fragmented Tools Are Slowing Vulnerability Management

Security leaders face a rapidly growing vulnerability backlog due to fragmented tools and slow remediation, with the mean time to…

Read More »
Business

Onapsis Platform Boosts SAP Security and Visibility

The Onapsis Control platform has been upgraded with enhanced security features that integrate with SAP CI/CD pipelines, expand Git repository…

Read More »
Business

VPN Credentials Fuel 50% of Ransomware Attacks

Ransomware activity surged in Q3 2025, with compromised VPN credentials being the primary entry point for nearly half of all…

Read More »
Business

Cyber Theory vs. Practice: Are Your Tools Failing You?

Traditional security measures often fail due to inaccurate data and manual processes, leaving organizations vulnerable as they operate with flawed…

Read More »
AI & Tech

Cogent Community: AI-Powered Vulnerability Intelligence for All

Security teams face operational inefficiencies due to overwhelming threat intelligence data, struggling to prioritize effectively amid overlapping feeds and fragmented…

Read More »
Business

Forescout eyeSentry: Continuous Cloud Exposure Management

Forescout launched eyeSentry, a cloud-native platform that helps enterprises identify and manage vulnerabilities across IT, IoT, and IoMT assets, addressing…

Read More »
Business

Identity: The Leading Cloud Security Threat

Identity-related weaknesses and outdated vulnerabilities are the main causes of the rise in cloud security incidents, with attackers exploiting these…

Read More »
Artificial Intelligence

Top Infosec Products of October 2025

The cybersecurity landscape in October 2025 saw companies introducing AI-driven solutions to automate security processes, improve visibility, and address evolving…

Read More »
Artificial Intelligence

Top Cybersecurity Open-Source Tools: October 2025 Edition

This month's selection of open-source cybersecurity tools offers cost-effective solutions for strengthening security across IT environments, including code analysis and…

Read More »
Business

Dependency-Track: Open-Source Software Supply Chain Security

Dependency-Track is an open-source platform that provides continuous, real-time monitoring of software supply chain risks by analyzing Software Bills of…

Read More »
AI & Tech

GitLab 18.5: AI-Powered Features Accelerate Software Development

GitLab 18.5 introduces AI-driven agents and a redesigned interface to streamline development workflows and reduce context switching for teams. The…

Read More »
AI & Tech

6 Key Metrics to Measure Cyber Resilience

Current cyber resilience measurement lacks standardized metrics, leaving governments unable to make informed policy decisions or compare capabilities across sectors…

Read More »
Business

Unified Exposure Management: The Future of Cyber Defense

The traditional cybersecurity model focused on detecting and responding to breaches is no longer sufficient, as modern organizations require proactive…

Read More »
BigTech Companies

Tenable Achieves PROTECTED IRAP & Hits Record Patch Tuesday

Tenable Cloud Security has achieved PROTECTED level certification under Australia's IRAP, validating its robust security controls for government cloud deployments…

Read More »
Business

Crafting an Effective Healthcare Cybersecurity Strategy

Focus on foundational cybersecurity controls like vulnerability management and network segmentation to maximize protection with limited resources, as they offer…

Read More »
Cybersecurity

Secure Your Code with DefectDojo: Open-Source DevSecOps

DefectDojo is an open-source platform that centralizes application security management, vulnerability tracking, and DevSecOps workflows by consolidating findings from multiple…

Read More »