The week in security: Patch the night away
Worried about insider threats? You should be, reports and experts all agree
David Braue | 21 Oct | Read more
Worried about insider threats? You should be, reports and experts all agree
David Braue | 21 Oct | Read more
Despite the masses of highly sensitive data that healthcare companies manage, new analysis has warned that chronically poor endpoint security, weak patching practices and high exposure to social engineering make the industry one of the worst-performing sectors when it comes to protecting data.
David Braue | 15 Feb | Read more
Microsoft's Patch Tuesday has its first security update for the HoloLens headset.
Attackers are targeting Office users with a flaw that Microsoft hasn’t patched yet. But it will patch it tomorrow, according to the researcher who first reported the bug to Microsoft.
Within two days of WordPress revealing a now patched flaw, attackers began searching for sites that hadn't updated.
It’s estimated that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Yet patching is a persistent challenge for IT managers. With the glut of patches released each year, how do you know which ones are truly critical security patches and which ones aren’t? And how can you identify which computers are actually missing the patches they need? This paper details a simple approach to patching that gives you better visibility into and control over patch assessment and compliance.