In order to be more security-conscious, companies must evolve as the sophistication of vulnerabilities, attacks and attackers have evolved. Your organization must have more than the good firewall, antivirus software and spam filtering of old to stave off today’s attackers.
Today, Microsoft released the MS15-078 bulletin containing a patch for yet another flaw in the Adobe Type Manager Font Driver (atmfd.dll). This patch, coming just shy of a week after Microsoft’s monthly Patch Tuesday event, fixes a kernel pool overflow vulnerability (CVE-2015-2426), which can allow remote code execution with full system rights. The vulnerability lies…
In advance of the upcoming Black Hat conference, the organization released a first-ever research report based on results of a survey to prior conference attendees. The report, titled, “2015: Time to Rethink Enterprise IT Security”, “reveals a significant gap between the priorities and concerns as well as the actual expenditure of security resources in the average enterprise.”
Cyber insurance is the fastest growing insurance product today, it’s development spurred on by several large data breaches covered in the news the past year and a half. As with any new product/service, there is a lot of variation and evolution in the coverage; here is what you need to know.
Earlier this year Dell’s SecureWorks published an analysis of a malware they named “Skeleton Key”. This malware bypasses authentication for Active Directory users who have single-factor (password only) authentication. The “Skeleton Key” attack as documented by the SecureWorks CTU relies on several critical parts.
In this on demand webinar, Cybersecurity Expert, Derek A.Smith will take you through his 10 steps for a successful vulnerability management program and how to get started now.
This blog post is republished with the permission of Network Computing. The increasing range of security information sources can be overwhelming. Brian Chappell, Director of Technical Services for BeyondTrust suggests that analytics may offer assistance.
Vulnerability scanning, threat management, risk analysis, patching, and configuration management are some of the major activities usually associated with vulnerability management, and none of these are new…so why are we failing so badly at many of them?
This month’s Patch Tuesday is massive, to say the least, with a total of 13 bulletins, affecting many products and all versions of Windows. Earlier this month, Microsoft announced that the upcoming Windows 10 will not follow the typical Patch Tuesday cycle and updates will be provided when they become available.
On Demand Webinar: Our latest webinar featured Dr. Mansur Hasib, CISSP, PMP, CPHIMS, in a discussion on electronic health records and the modern cyber criminal. Electronic health records are far more valuable to the modern cyber criminal. For the hacker, they fetch more value over a much longer period of time. For the victim – many who are still children — the repercussions could last decades!