New Search

If you are not happy with the results below please do another search

119 search results for: threat

71

Stop the Standstill: How Greenbone Helps Protect Against DoS Attacks

A DoS attack (Denial of Service) can mean a complete standstill: an important service fails, an application no longer responds or access to one’s own system is blocked. DoS attacks have a clear, destructive goal: to paralyze digital resources, preventing access to the legitimate users. The consequences of a DoS attack can be drastic: from […]

72

Understanding Mass Exploitation Attacks

If an organization has high value, you can bet that bad actors are contemplating how to exploit its IT weaknesses for financial gain. Ransomware attacks are the apex threat in this regard, rendering a victim’s data unusable, extorting them for a decryption key. Highly targeted organizations need to understand exactly where their risk lies and […]

75

… and Action! Greenbone at the it-sa Expo&Congress

Next week, it-sa, one of the largest platforms for IT security solutions, will kick off. On the opening day, October 22, 2024, from 11:00 a.m., Greenbone’s CEO Dr. Jan-Oliver Wagner will show how companies can remain capable of managing crisis situations. With the “Action” in Forum 6-B “Be secure and stay secure” he shows ways […]

77

KPI for Measuring Vulnerability Management Performance

Every business has mission critical activities. Security controls are meant to protect those critical activities to ensure business operations and strategic goals can be sustained indefinitely. Using an “Install and forget”-approach to security provides few assurances for achieving these objectives. An ever-changing digital landscape means a security gap could lead to a high stakes data […]

78

Greenbone Basic – Vulnerability Management for SMEs

Greenbone Basic: Small Businesses Can Now Easily Protect Themselves from Vulnerabilities Cyber attacks have become the greatest threat to modern businesses of all sizes. An abundant amount of attacks have caused a stir, cost billions, and resulted in production downtime and significant damage all over the world. Not a lot has changed in 2024, and […]

80

Helsinki Education System Breached via Unpatched Vulnerability

The cybersecurity threat environment has never been hotter or the stakes higher, and the cybersecurity community forecasts more of the same.  But, while there are more vulnerabilities for attackers to exploit, analysts also report that perpetrators are exploiting vulnerabilities faster, weaponizing new security advisories in a matter of days, maybe even hours after their publication.  […]