Blog

Blog

You’ve Upgraded Your Hardware. Now It’s Time to Upgrade Your Security Posture

If you have recently upgraded your hardware, our this is a great opportunity to establish IBM i security best practices for your organization now and into the future — and our free Security Scan will help you do just that. The Security Scan takes an inventory of your current security settings and uses the results to demonstrate your data’s degree of vulnerability and pinpoint specific weaknesses.
Blog

Patch Tuesday Update September 2023

This is my 211th Patch Tuesday in a role where I’m performing a complete analysis of the released Microsoft patches. It’s amusing to me to see what has changed and what has stayed the same.
Blog

Patch Tuesday Update - September 2023

Today’s Microsoft Security Update includes Microsoft Patch Tuesday checks in the NIRV 4.28.0 and Fortra VM Agent 1.64.0 releases.Microsoft addressed 59 vulnerabilities in this release, including five rated as Critical.This release also includes three republished non-Microsoft CVEs to address issues in Microsoft Edge (Chromium-based), Visual Studio Code, and 3D Viewer.Two of the CVEs fixed in this...
Blog

What Is Cloud Security?

Cloud security is the collection of plans, processes, and technologies that allow you to safely manipulate cloud-based data at rest, in use, and in motion. A comprehensive cloud-based security strategy encompasses several key elements.
Blog

My Top 5 Takeaways from Black Hat 2023

This was the first Black Hat I’ve attended since 2019. It was great seeing old friends, meeting new friends in real life, and learning new things about a fast-moving industry. I was glad to be back, and I took notes. I’ve included my top 5 takeaway list here.
Vulnerability Research

Patch Tuesday Update - August 2023

Today’s Microsoft Security Update includes the Microsoft Patch Tuesday checks in the NIRV 4.26.0 and Fortra VM Agent 1.63.0 releases.Microsoft included fixes for 74 vulnerabilities in this release, including 6 rated as Critical.Microsoft also released 2 security advisories this month with improvements related to defense in depth for Microsoft Office and the Memory Integrity System Readiness Scan...
Blog

INFOGRAPHIC: How to Protect Your Data from Email Phishing Attacks

Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.
Blog

Evolve Your Security Strategy to Prepare for DORA

Although the DORA compliance deadline is further away, financial institutions regulated by the Act should start preparing their journey now, before the last minute panic keeps knocking on your door. Antonio Sanchez breaks down the five DORA pillars and highlights what it takes to evolve your security effort.