Blog
Blog
WHAT YOU SHOULD KNOW: Patch OpenSSL 3.x
On October 25th 2022 the OpenSSL project team announced OpenSSL v.3.0.7: a CRITICAL security-fix release. This is only the second time that the OpenSSL project
Blog
Blog
Threat exposure management: the answer to 21st century cyber-security challenges
The chief information security officer (CISO) role is one that came into being as a result of an increasing wave
Blog
Blog
How Continuous Threat Exposure Management (CTEM) can secure the Healthcare Sector
Organizations are becoming increasingly susceptible to cyberattacks threatening the safety and privacy of stakeholders and clients alike. This is even
Blog
Blog
How Continuous Threat Exposure Management helps the Telecom sector defend against cyber threats
The telecom industry connects the world. Its intricate infrastructure is built around vast amounts of data on the world’s population
Blog
Blog
You’re never going to be able to fix every security vulnerability, but knowing where to start helps
Milpitas, California, August 29, 2022 — IT security operations, risk management and infrastructure teams face a daily challenge: do more with less.
Blog
Blog
The current cybersecurity challenge: All the threat data in the world, but no idea how to leverage it
  Milpitas, California, August 05, 2022 — Organizations today are facing a deluge of automated cybersecurity threats that are increasing exponentially
Blog
Blog
How Threat Exposure Management Can Minimize Attack Surface
An attack surface is any physical or digital asset of your organization that runs the risk of falling prey to
Blog
Blog
How to Evolve Your Vulnerability Management to Threat Exposure Management
One of the risks of only using vulnerability management is creating a false sense of security. For example, attackers can
Blog
Blog
The US Cyber Incident Reporting Act – its impact and its requirements for Critical Infrastructure Entities
US Congress passes ground-breaking new law with onerous requirements on cyber incident reporting. Here’s what you need to know: The Cyber
Blog
Blog
Unpromising Vulnerability Prioritization with Common Vulnerability Scoring System (CVSS)
What is CVSS? “The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of
1 4 5 6 7

What’s new on HivePro

Get through updates and upcoming events, and more directly un your inbox