Patch Management

Patch Management | News, how-tos, features, reviews, and videos

meltdown spectre
step four bullseye target process path direction arrow

3 patch training update software band aid laptop with virus binary

Bank OZK's vulnerability risk index shows patching priorities everyone understands

Explaining vulnerability risk to non-technical executives can be hard. With his CSO50 award-winning Vulnerability Exception Risk Index, Bank OZK CISO Jason Cathey has devised a way to turn vulnerability data into a simple risk metric....

patching against ransomware

The three most important ways to defend against security threats

Patching, security training programs and password management will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

automationlg

How automation enables a proactive security culture at Bank of England

The Bank of England security team uses automation to build intellectual capital, freeing up time to be more proactive and to better explain security to business units.

security network of computers with locked screens

Conway's Law: does your organization’s structure make software security even harder?

Why secure development programs succeed in organizations.

03 patch

Evaluating patch management software: 6 key considerations

Given the breadth of software systems in any given organization and the volume of patches being released by vendors, patch management software is a critical capability within IT environments today. Here's how to choose the tools...

group silhouette filled with binary code

SamSam explained: Everything you need to know about this opportunistic group of threat actors

The group behind the SamSam family of ransomware is known for recent attacks on healthcare organizations, but that's not its only target.

allscripts health care ransomware bitcoin

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.

patch

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need...

Windows logo overlaying hand with band-aid patch

A patch in time saved nine

In today’s Windows environment, things are changing, and the old cliches may no longer be true.

Broken window with band-aid patch

Meltdown and Spectre patches: Where to start and what to expect

You need to apply Meltdown and Spectre patches to pretty much everything in your enterprise. And you need to start now. We help you prioritize.

screen shot 2017 05 13 at 11.28.04 am

North Korea to blame for WannaCry, Trump administration says

On Monday evening, the Trump administration blamed North Korea for the WannaCry ransomware attacks back in May. Homeland security advisor, Thomas P. Bossert, published the administration's conclusions in an Op-Ed for the Wall Street...

Unlocked circuit board / security threat

Which vulnerability to fix first? Kenna Security has the answer

Kenna's vulnerability management platform is designed to prioritize the most dangerous vulnerabilities. Here's how it works.

dunce cap blunder

Being stupid isn’t an excuse

Do what needs to be done to protect your business and be the example for others in your industry.

data science certification man at computer

Do you patch your systems? How do you know?

Can you answer this question: how do you know the laptop that shows up today in Tokyo is the same one that was in New York last week? Make sure you have a complete inventory of hardware and software so you can be confident your...

03 patch

Patch management – not for the faint of heart

If you're a U.S. consumer, you're likely pretty peeved at Equifax right now. By all accounts, a missed patch led to the exfiltration of highly personal data on more than 145 million consumers. If patch management were easy, Equifax...

Broken window with band-aid patch

Change management: Equifax highlighted the vulnerability gap between disclosure and patch

The Equifax breach highlighted a gap between the disclosure of a vulnerability and the implementation of a patch as a result of change management process. Adversaries seek out unpatched targets in this period of time which...

cyberattack laptop arrows war fight

The 5 types of cyber attack you're most likely to face

Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront.

information security threat primary4

6 ways security pros unwittingly compromise enterprise security

Overwhelmed and eager to please, security professionals sometimes cut corners and take risks, unwittingly compromising enterprise security.

Load More