Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » vulnerability management

Articles Tagged with ''vulnerability management''

phone open to apps on home screen

Vulnerability management for an appsec world

Rickard Carlsson
October 13, 2023

The problem with common vulnerability and exposure lists, however, is that the vulnerabilities being generated in modern applications aren’t known.


Read More
white keyboard

81% of security leaders say that API security is a higher priority

Security Staff
October 3, 2023

According to a recent Noname Security report, API security is more of a priority for 81% of security leaders than it was 12 months ago.


Read More
black screen with glowing blue graphic

65% of organizations prioritize vulnerabilities based on risk

Security Staff
September 5, 2023

A recent report by Syxsense shows that 78% of respondents report experiencing an increase in vulnerability volume over the past 12 months.


Read More
software on computer screens

Vulnerabilities on external attack surfaces live far too long

Rob Gurzeev
August 17, 2023

Every company has two attack surfaces: internal and external. Of the two, the external attack surface (EAS) is much harder to safeguard. Why?


Read More
half open laptop

70% of web applications have severe security gaps

Security Staff
August 16, 2023

According to a CyCognito report, 74% of assets with personally identifiable information (PII) are vulnerable to at least one known major exploit.


Read More
ethernet cables plugged in

10% of expired certificates on the internet pose a security threat

Security Staff
August 1, 2023

A  survey found that nearly 80% of transport layer security (TLS) certificates on the Internet are vulnerable to Man in the Middle (MiM) attacks.


Read More
keyboard with pink lighting

Between 80 and 95% of cyberattacks begin with phishing

Security Staff
July 31, 2023

A recent Comcast Business report pulls data from 23.5 billion cybersecurity attacks and found that attacks come from internal and external sources.


Read More
computer and key lock

Vulnerable information is discovered within minutes by cybercriminals

Security Staff
June 20, 2023

Cybercriminal habits were analyzed in a recent report by Orca Security that reveals that attackers typically find exposed secrets in two minutes.


Read More
multicolored text on black computer screen

New vulnerabilities published in 2022 increased 25%

Security Staff
June 6, 2023

A report from Skybox Security found a 25% increase in new vulnerabilities published within 2022, a year-over-year rise the biggest seen since 2017.


Read More
computer controls

Four testing priorities for stronger API security

Frank Catucci
June 2, 2023

For a modern digital enterprise, the ubiquity, vulnerability and obscurity of APIs creates a perfect storm when it comes to application security.


Read More
Previous 1 2 3 4 5 6 7 8 9 10 11 12 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing