The Hive Blog
Quick and insightful reads from our industry thought leaders, acclaimed researchers, and tech innovators.
Blog
You’re never going to be able to fix every security vulnerability, but knowing where to start helps
Milpitas, California, August 29, 2022 — IT security operations, risk management and infrastructure teams face a daily challenge: do more with less. Blog
The current cybersecurity challenge: All the threat data in the world, but no idea how to leverage it
Milpitas, California, August 05, 2022 — Organizations today are facing a deluge of automated cybersecurity threats that are increasing exponentially Blog
How Threat Exposure Management Can Minimize Attack Surface
An attack surface is any physical or digital asset of your organization that runs the risk of falling prey to Blog
How to Evolve Your Vulnerability Management to Threat Exposure Management
One of the risks of only using vulnerability management is creating a false sense of security. For example, attackers can Blog
The US Cyber Incident Reporting Act – its impact and its requirements for Critical Infrastructure Entities
US Congress passes ground-breaking new law with onerous requirements on cyber incident reporting. Here’s what you need to know: The Cyber Blog
Unpromising Vulnerability Prioritization with Common Vulnerability Scoring System (CVSS)
What is CVSS? “The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of Blog
Modernizing Vulnerability Management with Risk-Based Prioritization
The process of identifying the most important vulnerabilities is a challenge every cybersecurity team faces To keep up with the Blog
Randori discovered Zero-day in Palo Alto’s GlobalProtect Firewall, affecting ~10,000 assets.
Outline Palo Alto Networks (PAN) released an update on November 10, 2021, that patched CVE-2021-3064, which was discovered and disclosed Blog
AntiVirus Evasion Techniques
Introduction Antivirus software looks for, detects, and eliminates viruses as well as other harmful software such as worms, trojans, adware, Blog
JSON Web Tokens – Attack and Defense
In this blog, we will learn about JSON web tokens and advantages of using them over traditional methods of authorization What’s new on HivePro
Get through updates and upcoming events, and more directly un your inbox