ResilientX Security Blog

Vendor Risk Management Best Practices in 2024
Security Blog

Vendor Risk Management Best Practices in

Vendor risk management (VRM) is a critical component for...

Implementing a Robust Third Party Risk Management
Security Blog

Implementing a Robust Third-Party Risk Management

Third-party risk lurks in the shadows of every partnership...

The Essential Guide to Automated Attack Surface Management
Security Blog

The Essential Guide to Automated Attack

In today’s digital environment, securing online assets against cyber...

Understading vendeor risk and vendeor risk management
Security Blog

Understanding Vendor Risk and Vendor-Risk Management

Organisations increasingly rely on third-party vendors to enhance operational...

Cloud Penetration Testing Challenges and Best Practices
Security Blog

Cloud Penetration Testing: Challenges and Best

Navigating the complexities of cloud security requires a proactive...

Integrating Application Security Testing into the DevOps Pipeline
Security Blog

Integrating Application Security Testing into the

Integrating Application Security Testing (AST) into the DevOps pipeline...

Vulnerabilities and Risk

CVE-2023-4863: A Comprehensive Guide

CVE-2023-4863 refers to a critical heap buffer overflow vulnerability found...

Read the full article

Ivanti’s Zero-Day Vulnerabilities (CVE-2024-21887 and CVE-2023-46805)

Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS), formerly...

Read the full article

News and Webinars

Announcements

ResilientX Security Named Finalist in Digithon

We are thrilled to announce that ResilientX Security, your...