ResilientX Security Blog

Security Blog

The Growing Threat of Software Supply

This article explores what software supply chain attacks are,...

Security Blog

Securing Your AWS Cloud Environment with

AWS security audits are critical for identifying misconfigurations, access...

The Essential Guide to Website Penetration Testing
Security Blog

The Essential Guide to Website Penetration

Learn why website penetration testing is critical for security....

Security Blog

An Introduction to the NIST AI

Artificial intelligence (AI) technologies hold tremendous potential to transform...

Security Blog

IBM Cost of a Data Breach

The Cost of a Data Breach Report by IBM...

Security Blog

Security Performance Assessment for Supply Chain:

This article dives deep into the core facets of...

Vulnerabilities and Risk

Responding to Critical Vulnerabilities in Ivanti Endpoint Manager Mobile (CVE-2023-35078)

Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, was recently...

Read the full article

Responding to Critical Vulnerabilities in FortiOS SSL VPN (CVE-2023-27997)

A severe vulnerability recently disclosed in Fortinet’s FortiOS SSL VPN...

Read the full article

Microsoft Patch 73 CVEs in August 2023 (CVE-2023-38180)

Microsoft released its monthly Patch Tuesday security updates for August...

Read the full article