SecurityTrails Blog

Insights and lessons learned from the recent BIG-IP Application Delivery Services Vulnerability.
SecurityTrails Blog · May 16 · by German Hoeffner

Insights and lessons learned from the recent BIG-IP Application Delivery Services Vulnerability

Every few months, a bug will come along that puts the information security community into a flurry of activity. Working weekends and nights to understand new vulnerability information as it comes to light, applying new patches (sometimes multiple times, as the situation changes), while also keeping apprised of new information hasn’t been uncommon. Throughout these past couple of years, we’ve had bugs as notable as Log4J, ProxyLogon, and more recently, a string of F5 vulnerabilities.

Cybersecurity: The Key to Your Divestment Process.
SecurityTrails Blog · May 05 · by Sara Jelen

Cybersecurity: The Key to Your Divestment Process

Divestitures occur when an organization sells a division or portion of their business and assets to another company. This process can be set in motion for various reasons, including the want of financial gain in difficult times (wherein an organization might sell off their least profitable assets), the desire to free up resources (to increase focus on a primary area of business), and to lower the risk of non-compliance with regulations.

X