Intelligence & Analytics July 19, 2017 Monitor Your Network for NotPetya in Real Time 3 min read - With the QRadar NotPetya Content Pack, security analysts can monitor their networks for indicators of NotPetya ransomware in real time.
July 14, 2017 IT Managers Must Patch Security Vulnerabilities in Microsoft Windows 2 min read - Researchers uncovered two security vulnerabilities in Microsoft Windows that could put businesses at risk of credential forwarding and password cracking.
July 10, 2017 Google Patches Critical Android Vulnerabilities 2 min read - Google recently disclosed 138 Android vulnerabilities, including media framework issues that could enable attackers to execute arbitrary code remotely.
Endpoint July 3, 2017 Going Through a Rough Patch in Your Security Program? Consistent Software Patching Can Solve Security Woes 2 min read - Effective and consistent software patching can solve the majority of common security challenges, yet many organizations struggle with patch management.
June 22, 2017 Stack Clash Bug Could Compromise Linux and Unix Defenses 2 min read - Attackers could exploit a vulnerability known as the Stack Clash bug to gain full root privileges, according to researchers at security firm Qualys.
Endpoint June 22, 2017 Health Care Endpoint Hygiene: A Post-WannaCry Call to Action < 1 min read - The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
CISO June 19, 2017 Cyber Solstice: IT Security Tasks to Tackle on the Longest Day of the Year 3 min read - Security professionals should take advantage of the longest day of the year to take care of security tasks that are typically placed on the back burner.
Risk Management June 16, 2017 Back to Basics: Six Simple Strategies to Strengthen Your Security Posture 2 min read - These six basic strategies can help organizations stop some threats, minimize others and improve their overall security posture.
June 7, 2017 Cold Comfort: Outdated Software Puts Companies in the Hot Seat 2 min read - Outdated software offers familiarity for IT teams, but that's cold comfort when it comes to the hot seat of legal challenges and ransomware infections.
Software Vulnerabilities May 30, 2017 Relying on Data to Mitigate the Risk of WordPress Website Hijacking 9 min read - To protect their WordPress sites from scammers, administrators must proactively patch and monitor their installations to weed out unwanted content.