Resources

Blog

Patch Tuesday Update August 2024

The three CVSS 9.8 vulnerabilities included in this month’s patch drop are likely to be the first thing that catches anyone’s attention this month. All three are remote, unauthenticated code execution, the very type of vulnerability where we previously would have used the word, “wormable.”
Blog

CVE-2024-6768: Improper Validation of Specified Quantity in Input Produces an Unrecoverable State in CLFS.sys Causing a BSoD

IntroductionCVE-2024-6768 is a vulnerability in the Common Log File System (CLFS.sys) driver of Windows, caused by improper validation of specified quantities in input data. This flaw leads to an unrecoverable inconsistency, triggering the KeBugCheckEx function and resulting in a Blue Screen of Death (BSoD). The issue affects all versions of Windows 10 and Windows 11, Windows Server 2016, Server...
On-Demand Webinar

[WEBINAR] Nowhere Left to Hide: Exposing Financial Services Fraudsters Who Hide in Plain Sight

Session DetailsSecurity leaders of financial institutions have some of the most demanding job descriptions in the industry. Threat actors go where the money goes, and let’s just say that a certain industry has a giant sign hanging above it.As teams try to crack down on enterprise security, cybercriminals continue to attack on multiple fronts. With the complexity of the financial sector increasing...
Live Webinar
While October is officially Cybersecurity Awareness Month, for security professionals, every day is about educating and equipping your users on the importance of strong cybersecurity. Whether you're in a SOC role or wearing multiple hats in IT and security, we wanted to bring together security operations professionals everywhere for engaging virtual discussion. Like Oktoberfest...
Blog

Managing the Rising Tide of CVEs

If you are watching recent security stats, you’ll likely spot an alarming trend.Common Vulnerabilities and Exposures (CVEs) are on the rise and expected to increase by 25% in 2024, reaching 2,900 CVEs per month¹. It’s not a huge surprise that the number of known vulnerabilities is growing, given the proliferation of systems and software. Unfortunately, average time to remediation is increasing as...
Blog

RPA Implementation Guide

Robotic process automation (RPA) implementation is about more than just finding a software tool. RPA can transform your business by simplifying the tedious, repetitive processes holding you back, but to do so, you need a proper RPA implementation strategy.Companies want to embrace the transformative technology but struggle with where to start, what processes to automate, and how to measure the...
Blog

3 Components of a Proactive Security Strategy 

Your organization might have many cybersecurity defenses in place, but defenses alone are not enough to protect you from today’s multi-faceted cyberattacks. Proactively adding a layer of offensive security assessment and testing helps you pinpoint your system weaknesses before they are exploited. Proactive security measures help you stay ahead of attackers by:Identifying vulnerabilities and...
Blog

How to Automate Login to a Website and Download a File

If you're a developer, scripting automations like webpage logins and file downloads can be fun. But most business users don't have the time or skill for such an undertaking. Learn how robotic process automation (RPA) offers an alternative to scripting and makes it easy to automate login to a website and download a file.
On-Demand Webinar

IBM i in 2024: From AS400 to AI

Watch as IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington share their unique perspective on the direction of this platform.