31.01.2023 Views

Cyber Defense eMagazine February Edition for 2023

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Looking Into Proactive <strong>Cyber</strong>security: Are<br />

Vulnerability Scanners Failing You?<br />

By Aaron Sandeen, CEO and Co-Founder, <strong>Cyber</strong> Security Works<br />

Since November 3, 2021, the government organized <strong>Cyber</strong>security and Infrastructure Security Agency<br />

(CISA) has kept an up-to-date list of known exploited vulnerabilities. CISA advises the patching of<br />

previously exploited vulnerabilities due to the fact that criminal threat actors routinely exploit them.<br />

Over the past year, vulnerabilities have increased in quantity and sophistication. They manifest in various<br />

<strong>for</strong>ms including vulnerabilities that allow remote code execution (RCE) or privilege escalation (PE).<br />

Security teams have become rightly wary of the situation! Thus organizations have invested more money<br />

into vulnerability awareness, leading to security teams relying on vulnerability scanners to check their<br />

network. However, when those same scanners fail to detect critical vulnerabilities, organizations are<br />

exposed to risks and threats that could have been prevented.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2023</strong> <strong>Edition</strong> 114<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!