DATA SECURITY, ENTERPRISE IDENTITY, CERTIFICATIONS AND TRAINING

CISA Stakeholder-Specific Vulnerability Categorization Guide

November 9, 2022

CISA Stakeholder-Specific Vulnerability Categorization Guide
The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Spotlight

Huntsman Security - a Tier-3 company

Huntsman Security is the creator of the Huntsman® Security Analytics Platform that protects sensitive environments and critical national infrastructure in the Five Eyes community. A private Australian company founded in 1999; we have offices in Australia, UK, Japan and North America. The Huntsman® technology delivers comprehensive Security Analytics capabilities, including Safe Automation and Threat Verification at crucial stages of the incident management process.

OTHER WHITEPAPERS
news image

GBM Security Whitepaper

whitePaper | November 10, 2019

We are living in an era of digital disruption. Multiple industries are being disrupted, or fear being disrupted in the near future. Business models are evolving to cater to the dynamic markets and digital transformation that seems to be the answer to changing business models. Digital transformation is rapidly becoming a key priority in most industries, as organizations adapt to changing markets by leveraging technologies to build IT-centric business models. In general, organizations are using digital transformation to reach their goals of achieving greater agility, improving operational efficiency, improving customer experiences, and developing new revenue streams.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More
news image

XDR vs. SIEM: A Cybersecurity Leader’s Guide

whitePaper | December 27, 2022

As threats intensify and SecOps teams are called upon to defend digital environments that keep growing in size and complexity, and with a defensible perimeter that has all but disappeared, cybersecurity vendors are responding with a new generation of software and service solutions.

Read More
news image

Data Services Cloud Console Security Guide

whitePaper | March 2, 2023

Cloud-based management from Hewlett Packard Enterprise offers many advantages for both data infrastructure and the data itself. Data Services Cloud Console (DSCC) is the HPE cloud-based application for current and future data and storage management.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

How to Prepare For & Respond to Ransomware in Operational Technology Environments

whitePaper | March 14, 2023

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.

Read More

Spotlight

Huntsman Security - a Tier-3 company

Huntsman Security is the creator of the Huntsman® Security Analytics Platform that protects sensitive environments and critical national infrastructure in the Five Eyes community. A private Australian company founded in 1999; we have offices in Australia, UK, Japan and North America. The Huntsman® technology delivers comprehensive Security Analytics capabilities, including Safe Automation and Threat Verification at crucial stages of the incident management process.

Events