Category: Vulnerabilities

April 11th, 2018 by John

If you don’t have a reliable and authoritative repository of the devices connected to your network, their posture and the use of privileged accounts, it is difficult to believe that you really have any hope of managing them well to protect your organization’s sensitive information. If you are not managing IT security risk well, it will have an effect on all aspects of enterprise risk. This is why situational awareness needs to be a top enterprise focus.

The first category in the NIST Cybersecurity Framework is “Identify”. The first 5 CIS controls related to discovery, inventory and posture of endpoints, software and privileges. Read More

Posted in Blog, Cybersecurity & Infosec, Risk Management, Vulnerabilities

March 31st, 2018 by John

Posted in Vulnerabilities

March 31st, 2018 by John

Posted in Vulnerabilities

March 14th, 2018 by John

https://www.scmagazine.com/this-months-patch-tuesday-fixed-bug-that-could-exploit-authentication-in-microsoft-remote-desktop-protocol/article/750777/

Posted in Vulnerabilities

March 14th, 2018 by John

https://www.scmagazine.com/the-vulnerabilities-included-a-user-after-free-and-type-confusion-vulnerability-which-could-both-result-in-remote-code-execution-if-exploited/article/750776/

Posted in Vulnerabilities