Most of the excitement may already have passed with Adobe’s Flash Player release on June 7th. The discovery of a Zero Day vulnerability (CVE-2018-5002) being exploited in the wild resulted in a Flash Player update (APSB18-19) which included the fix for the exploited vulnerability and three others.
Looking for a clear, well-structured overview of best practices and trends in patch management? Then this Ivanti security webinar is for you. First presented at Interchange 2018 in Dallas the week of May 13th and subsequently online, it’s one of our most popular sessions and is ready when you are.
It is a commonly known fact that soon after cavemen discovered fire they tackled the next age-old question: Do we really still need to patch our applications? Cygilant, an Ivanti partner, recently hosted a webinar about reducing the attack surface with integrated vulnerability and patch management.
Or, as I call it, “The One Where I Liken My Brand of Business Travel to Cybersecurity.” No, really. Bear with me. It will all become clear. Let’s just dive in, shall we? When I go on a business trip, I have this plan that everything will go smoothly. I’ll pack 24 hours beforehand, sail through th
Microsoft has released their Patch Tuesday update and it includes quite the lineup this month. 66 unique CVEs are being resolved this month. This includes two zero-day vulnerabilities and two public disclosures. The updates this month affect Microsoft Windows, Internet Explorer, Edge, Office, .Net F
Learning to walk before you run. A key basic skill we all learn as toddlers and surely enough it sticks with us as we progress to the more advanced activities on two legs: jogging, skipping, running, sprinting, etc. So why is it that organizations forget how to walk? At Cyber UK 2018, the NCSC (Nati
Writing for Wired.com on March 30, 2018, Lily Hay Newman’s headline reads, The Ransomware that Hobbled Atlanta Will Strike Again. So true. So, what can you do when it comes to malware protection? Ivanti can help. But first, a little background. SamSam has been around since 2015. As a malware attack,
Nobody on their deathbed has ever said, "I wish I had spent more time at the office." The same can be said in regards to security. "I wish I spent more time responding to security breaches," is a sentence not likely to be said by anyone, unless the person works for a security firm contracted to resp
If your organization is like many we encounter, then you are undoubtedly facing shifting issues affecting your security posture. You are trying to handle the crushing task of meeting security specifications with inadequate resources. You are also charged with proving the integrity of the security da