5 Vulnerability Management Best Practices

Vulnerability management is the process of identifying, prioritizing, remediating, and reporting on vulnerabilities to proactively reduce your cyber risk. As organizations transition to the cloud, and the number of open-source libraries increases, vulnerability management gets more and more difficult. In 2021, there were more than 20,000 CVEs (common vulnerabilities and exposures) reported, a 212% increase…

Read More

4 Stages of the Vulnerability Management Process

A vulnerability is a flaw or weakness in a system that, if exploited, would allow a user to gain unauthorized access to conduct an attack. Vulnerability management is the process of identifying, prioritizing, remediating, and reporting on vulnerabilities to proactively reduce your cyber risk. Because new vulnerabilities are constantly being introduced, vulnerability management is not…

Read More

Member Spotlight: Jason Reaves

Today’s member spotlight is Jason Reaves, senior-level individual contributor for Walmart Global Tech. We asked him to share with us his journey in cybersecurity and how he is utilizing his RH-ISAC membership. RH-ISAC: What is your background in cybersecurity? Where did you get your training and education? Jason: I moved from a development and military…

Read More

Preventing Ransomware Attacks in a Hybrid Cloud Environment

Businesses interested in scaling up operations are turning to hybrid cloud environments as a cost-effective solution. Hybrid clouds provide the best of both worlds, allowing companies to expand their network without investing in additional, costly on-premises servers that must be maintained. While there are a number of benefits to a hybrid cloud environment, it is,…

Read More

Newly Discovered Chinese APT Operating Cyberespionage Campaign Against APAC Organizations Since 2013

Context On June 9, 2022, SentinelLabs disclosed technical details of a new Chinese-speaking cyberespionage group designated Aoqin Dragon. According to researchers at SentinelLabs, the group has been operating a cyberespionage campaign against government, education, and telecommunication organizations in Southeast Asia and Australia from at least 2013 to the present. SentinelLabs researchers also assessed with moderate…

Read More