Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

Dark Reading Launches Vulnerability Management Tech Center

Today Dark Reading launches a new feature: the Vulnerability Management Tech Center, a subsite of Dark Reading devoted to bringing you news, product information, opinion, and analysis of the technologies and practices used to identify and eradicate security vulnerabilities from enterprise IT environments.

Today Dark Reading launches a new feature: the Vulnerability Management Tech Center, a subsite of Dark Reading devoted to bringing you news, product information, opinion, and analysis of the technologies and practices used to identify and eradicate security vulnerabilities from enterprise IT environments.This is the fourth of our Dark Reading Tech Centers, which are designed to provide you with a more focused view of specific issues, threats, and technologies in the world of IT security. The Tech Centers offer in-depth reports and studies, breaking news, and links to additional articles and information not found on the main Dark Reading site. Just as a traditional newspaper offers in-depth sections and supplements on sports, entertainment, or politics, the Dark Reading Tech Centers provide an additional range of news and information for readers who have an interest in specific aspects of IT security.

While Dark Reading does a good deal of coverage of online attacks, breaches, and newly discovered vulnerabilities, we haven't had a section that discusses what enterprises should do about them -- until now. The Vulnerability Management Tech Center is designed to provide news and insight on best practices and technologies for detecting, assessing, and eradicating vulnerabilities from your enterprise IT environment. Our News Analysis section alerts you to new threats; the Vulnerability Management Tech Center offers guidance on how to respond.

With this definition in mind, you can expect the Vulnerability Management Tech Center to take a broad view of the discipline. This subsite will include coverage of vulnerability assessment, enterprise auditing, penetration testing, and even incident response. We'll discuss not only the process of finding and fixing flaws in your systems and applications, but also how to respond if a vulnerability is being exploited in your environment.

The goal of the Vulnerability Management Tech Center is to help you make informed decisions about which tools, technologies, services, and practices you can use to identify vulnerabilities in your networks and applications. In some cases, we'll discuss practices you can implement yourself; in other cases, we'll offer a look at technologies or services you can purchase from vendors. And, of course, we'll keep you abreast of new vulnerabilities and how you can respond.

Of course, the creation of the Vulnerability Management Tech Center doesn't mean our coverage of this important topic on the main Dark Reading site will decrease. You'll continue to see stories about newly discovered vulnerabilities on our home page, and the subject will remain a topic of discussion for our bloggers and on our message boards. But when you click on those stories or blogs, you'll be brought here, to the Tech Center, so that you can see the full range of news and information that we offer on the topic, and gain additional context to support what you're reading.

We think the Vulnerability Management Tech Center will help you understand the current market and make good decisions about the tools and practices that might work best for your organization. But in the end, this is your site. Please let us know what you think of the Tech Center, our coverage of vulnerability management, and what you'd like to see us cover in more depth. We can't guarantee we'll answer every query with a story or in-depth report, but we'll do our best to meet your needs for additional information and analysis.

If it has to do with finding, assessing, or fixing vulnerabilities in the enterprise, you'll find it here. And if you don't, let us know -- our goal is to be the most comprehensive source of vulnerability management news and information on the Web.

--Tim Wilson, Editor, Dark Reading Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11854
PUBLISHED: 2020-10-27
Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravil...
CVE-2020-11858
PUBLISHED: 2020-10-27
Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 ...
CVE-2020-23945
PUBLISHED: 2020-10-27
A SQL injection vulnerability exists in Victor CMS V1.0 in the cat_id parameter of the category.php file. This parameter can be used by sqlmap to obtain data information in the database.
CVE-2020-7754
PUBLISHED: 2020-10-27
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
CVE-2020-6023
PUBLISHED: 2020-10-27
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware.