article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

To learn more about assessing the security of a software product: “ How to Assess a Vendor's Data Security ” (Electronic Frontier Foundation). “ 6 Ways to Optimize Vendor Management Programs ” (IANS Research). What is patch management?" (TechTarget). Software Supply Chain Security Guidance ” (U.S.

article thumbnail

Attack Surface: Definition, Management and Reduction Best Practices

Kaseya

Anything that lives outside the firewall and is accessible through the internet is part of a digital attack surface. As opposed to a digital attack surface, a physical attack surface can be leveraged even when a device is not connected to the internet. Your asset inventory. Your attack vectors and potential exposures.

article thumbnail

Kentik’s Journey to Deliver the First Cloud Network Observability Product

Kentik

Internal communications routed over internet gateways and driving up costs. And the cloud vendorsmanagement interfaces don’t make it easy to do simple things like figuring out traffic paths or visualizing traffic going over a VPN. Abandoned gateways and subnets configured with overlapping IP space.

Network 52