Blog
Blog
You’re never going to be able to fix every security vulnerability, but knowing where to start helps
Milpitas, California, August 29, 2022 — IT security operations, risk management and infrastructure teams face a daily challenge: do more with less.
Blog
Blog
The current cybersecurity challenge: All the threat data in the world, but no idea how to leverage it
  Milpitas, California, August 05, 2022 — Organizations today are facing a deluge of automated cybersecurity threats that are increasing exponentially
Blog
Blog
How Threat Exposure Management Can Minimize Attack Surface
An attack surface is any physical or digital asset of your organization that runs the risk of falling prey to
Blog
Blog
How to Evolve Your Vulnerability Management to Threat Exposure Management
One of the risks of only using vulnerability management is creating a false sense of security. For example, attackers can
Blog
Blog
The US Cyber Incident Reporting Act – its impact and its requirements for Critical Infrastructure Entities
US Congress passes ground-breaking new law with onerous requirements on cyber incident reporting. Here’s what you need to know: The Cyber
Blog
Blog
Unpromising Vulnerability Prioritization with Common Vulnerability Scoring System (CVSS)
What is CVSS? “The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of
Blog
Blog
Modernizing Vulnerability Management with Risk-Based Prioritization
The process of identifying the most important vulnerabilities is a challenge every cybersecurity team faces To keep up with the
Blog
Blog
Randori discovered Zero-day in Palo Alto’s GlobalProtect Firewall, affecting ~10,000 assets.
Outline Palo Alto Networks (PAN) released an update on November 10, 2021, that patched CVE-2021-3064, which was discovered and disclosed
Blog
Blog
AntiVirus Evasion Techniques
Introduction Antivirus software looks for, detects, and eliminates viruses as well as other harmful software such as worms, trojans, adware,
Blog
Blog
JSON Web Tokens – Attack and Defense
In this blog, we will learn about JSON web tokens and advantages of using them over traditional methods of authorization
1 3 4 5

What’s new on HivePro

Get through updates and upcoming events, and more directly un your inbox