Having been involved in hundreds of vulnerability assessments I can confidently say that most issues have a single underlying source. The discovered vulnerability could be an increased risk of ransomware exposure, buffer overflows, elevation of…
The latest Internet Explorer “Zero-Day” vulnerability, first acknowledged by Microsoft on Saturday, April 26th, has left all version of Internet Explorer 6 through 11 vulnerable to exploitation. However, initial reports indicate that IE versions 9,…
Regardless of your industry, staying proactive with patch management can be a time consuming but extremely important effort. This is where a managed patching provider can be an invaluable resource. If you were to conduct…
The Department of Homeland Security (DHS) last week released an alert indicating that all versions of Java up to and including the then latest Java version 7 update 10, contained weaknesses that could allow a…
Quality network security is an essential part of the operations for your business and meeting data protection compliance and regulatory requirements. It sounds really simple to say you just want to “keep the criminals out”…
Network Security in today’s high tech environment is now more important than ever. Hackers and cyber criminals have gotten very sophisticated in the methods they use to carry out exploits. For many companies this means…
The security of today’s information systems go far beyond the general protection measures that were once considered to provide ample security against intrusion.For many companies that are implementing new technologies one of the top priorities…