<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / threat</title>
<link>http://netvouz.com/lillymark/tag/threat?feed=rss</link>
<description>lillymark&#39;s bookmarks tagged &quot;threat&quot; on Netvouz</description>
<item><title>Compliance Combines with Vulnerability Scanning to Create Aegify</title>
<link>http://www.egestalt.com/compliance-combines-with-vulnerability-scanning-to-create-aegify.html</link>
<description>Two security firms, the established Rapid7 vulnerability manager and eGestalt, a cloud-based compliance management provider, have signed an OEM deal that will do something for the IT security industry that hasn&#39;t been done before: a combination security and compliance posture management offering called Aegify SPM.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 14 Dec 2012 09:30:39 GMT</pubDate>
</item><item><title>Compliance Combines with Vulnerability Scanning to Create Aegify</title>
<link>http://www.egestalt.com/compliance-combines-with-vulnerability-scanning-to-create-aegify.html</link>
<description>Two security firms, the established Rapid7 vulnerability manager and eGestalt, a cloud-based compliance management provider, have signed an OEM deal that will do something for the IT security industry that hasn&#39;t been done before: a combination security and compliance posture management offering called Aegify SPM.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 14 Dec 2012 09:31:56 GMT</pubDate>
</item><item><title>Cyber attack is ’single largest threat’ to U.S.: House Intelligence Committee head</title>
<link>http://www.egestalt.com/blog/2012/06/25/cyber-attack-is-single-largest-threat-to-u-s-house-intelligence-committee-head-business-insurance/</link>
<description>Cyber attacks represent “probably the single largest threat” facing the United States, the chairman of the U.S. House of Representatives Intelligence Committee said Monday.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 27 Jun 2012 05:27:47 GMT</pubDate>
</item><item><title>Effective Threat Management Solutions</title>
<link>http://www.egestalt.com/threat-management.html</link>
<description>With an effective threat management solutions, organizations can successfully defend themselves against the cyber threats of today. eGestalt’s threat management solutions provides an end-to-end automation of all enterprise security, compliance, audit &amp; risk management needs with easy monitoring.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 02 Mar 2012 05:15:56 GMT</pubDate>
</item><item><title>eGestalt Announces Next Generation Security Posture Management with Aegify</title>
<link>https://www.egestalt.com/egestalt-announces-next-generation-security-posture-management-with-aegify.html</link>
<description>eGestalt Technologies (www.eGestalt.com), a provider of IT security monitoring and compliance management for SMBs and enterprises, today announced Aegify, the world’s first completely integrated and unified IT-GRC and cloud-based Security Posture Management (SPM) product using a completely software-based solution.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 20 Nov 2012 07:56:30 GMT</pubDate>
</item><item><title>eGestalt Launches Next Generation Security Posture Management Product</title>
<link>http://www.egestalt.com/egestalt-launches-next-generation-security-posture-management-product.html</link>
<description>Security monitoring and compliance management provider eGestalt Technologies has released an integrated and unified IT-GRC and cloud-based security posture management (SPM) software product, Aegify.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 10 Dec 2012 12:03:09 GMT</pubDate>
</item><item><title>Hacktivist Groups Pose Major Threat- Organizations Beware!</title>
<link>http://www.egestalt.com/blog/2012/03/23/hacktivist-groups-pose-major-threat-organizations-beware/</link>
<description>A cyber-attack can affect organizations at different levels. While organizations are actively trying to prevent these attacks, ironically the number of attacks seems to be constantly on the rise. More shockingly, the 2012 Data Breach Investigations Report released by Verizon indicates a dramatic increase in cyber-attacks linked to hacktivist groups. Groups like ‘Anonymous’ and ‘LulzSec’ are seen to attack organizations for reasons other than financial gain.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 17 Apr 2012 09:54:01 GMT</pubDate>
</item><item><title>Implementing software security: Threat modeling</title>
<link>http://www.estuate.com/estuate-blog/111-software-management/571-implementing-software-security-threat-modeling</link>
<description>Software security has emerged as a prevalent concern in the application development industry, particularly for organizations deploying Web-connect software. However, all businesses could benefit from evaluating their processes and improving security. One method that can be employed to do this is threat modeling, a strategy that focuses on determining what type of attack is mostly likely to target a piece of software.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 22 Jul 2014 05:17:36 GMT</pubDate>
</item><item><title>Security Posture Management Enters the Cloud</title>
<link>http://www.egestalt.com/security-posture-management-enters-the-cloud.html</link>
<description>When eGestalt of Santa Clara, CA, announced in November they were launching a cloud-based security and compliance solution, it set the stage to change the way enterprise businesses could cope with complex compliance and security issues.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 13 Dec 2012 12:22:44 GMT</pubDate>
</item><item><title>Security Threats Predictions in 2015 - Netmagic</title>
<link>http://www.netmagicsolutions.com/blog/security-threats-predictions-in-2015</link>
<description>This article from Netmagic focuses on the security threats that a business enterprise face, such as threat mitigation in cloud, internet of things and mobility are the new normal in security</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 20 Feb 2015 09:15:55 GMT</pubDate>
</item></channel></rss>