Blog

Blog

SAST vs DAST: Partners or Enemies?

In our fast-paced digital world, the pressure is on to release new apps, features and enhancements as quickly and as often as possible. But how do you manage constant code changes without introducing security vulnerabilities?And how do you address the elephant in the room that comes with increased usage of cloud apps in the wake of the disruption caused by COVID-19? New applications open new doors...
Blog

Reduce Virus Spread with QIBM_QP0L_SCAN_OPEN and QIBM_QPWFS_FILE_SERV

The data below is taken from the 2021 State of IBM i Security Study, which provides compelling insight into the security posture of 247 IBM i servers and partitions—systems that are often used for business-critical data, payment card data, and personally identifiable information (PII). The full study can be accessed here. ...
Blog

Are MSPs Right for Me?

Figure out if MSPs are right for your organization. What are the risks and rewards of managed service providers?
Blog

What Is NVMe?

NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.
Blog

Realize ROI with Robot

Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
Blog

Five Steps for Successful IBM i Role Swaps

Your high availability solution is only as solid as your role swaps. You can’t be certain that your systems are switch-ready unless you test. Follow these steps to start testing your role swaps regularly.
Blog

Microsoft Exchange Server Remote Code Execution (RCE) Vulnerability

Microsoft Exchange Server Remote Code Execution (RCE) VulnerabilityOn Tuesday, March 2nd, Microsoft released an out-of-band security update to mitigate four zero-day vulnerabilities that were observed being exploited in the wild against Microsoft Exchange Servers. A server-side request forgery (SSRF) being tracked as CVE-2021-26855 is the likely initial access for attackers. Exploitation of this...
Vulnerability Research

NETSHIELD Corporation Nano 25 Vulnerability

We are disclosing a vulnerability identified in NETSHIELD Corporation Nano 25. The engineers at NETSHIELD Corporation were prompt in their response when notified of the flaw and have provided a patch for the cyber security issue.NETSHIELD Corporation has released a patch for the affected Nano 25 version 10.2.18.Fortra VM will not include an explicit check for this vulnerability due to the...
Vulnerability Research

Microsoft Defender Zero-Day Remote Code Execution (RCE) Vulnerability

Microsoft Defender Zero-Day Remote Code Execution (RCE) VulnerabilityOn Tuesday, January 12th, Microsoft released a patch for an RCE vulnerability present within their antivirus solutions, Windows Defender, System Center Endpoint Protection, and Security Essentials. his vulnerability is being tracked as CVE-2021-1647. Although an exploit has not been publicly released, this vulnerability is...
Blog

Win at Remediation with Quality over Quantity

Win at Remediation with Quality over Quantity VM plan Managing Vulnerabilities Effectively Requires a Quality Over Quantity MindsetBusiness networks will always play host to a number of vulnerabilities. Factor in the current proliferation of endpoints and growing network complexity and you have a list of vulnerabilities that is growing exponentially. The number of reported vulnerabilities has...
Blog

Palo Alto Networks Cortex XSOAR: Prioritizing and Accelerating Remediation of Systems

Vulnerability management and threat assessment solutions provide the first line of defense in protecting assets across an organization, yet today’s widely deployed solutions are outdated in terms of providing an accurate real-time assessment of today’s complex hybrid-cloud environments. In addition, the majority of legacy solutions fail to prioritize the remediation of risky assets or even assets...
Blog

Zyxel Hardcoded Backdoor Account Vulnerability

Zyxel Hardcoded Backdoor Account VulnerabilityOn December 23rd, 2020, the Dutch security firm Eye disclosed a hardcoded backdoor account within the firmware 4.60 on Zyxel Firewalls and AP Controllers. The credentials for this account cannot be changed or altered unless the firmware is patched. These hardcoded credentials provide access to both SSH and web admin interfaces, where additional...