Blog Posts Tagged with "Patch Management"

Fc152e73692bc3c934d248f639d9e963

Understanding the Intent of PCI Requirement 11.2

February 09, 2011 Added by:PCI Guru

Requirement 11.2 requires that vulnerability scanning is performed at least quarterly. Given the 30 day patching rule and the fact that scanning must be performed after all “significant” changes, an organization really needs to conduct monthly scanning at a minimum to stay compliant...

Comments  (2)

B451da363bb08b9a81ceadbadb5133ef

Another Resolution For 2011: Secure Your Sensitive Data

February 01, 2011 Added by:Alexander Rothacker

Tack on one more resolution for 2011 – secure your sensitive information. Hackers are constantly looking for ways to access critical corporate data and have moved away from the idea of “breaking in because they can” and are looking to harvest sensitive information to sell on the black-market...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Oracle’s January 2011 Critical Patch Update

January 24, 2011 Added by:Alexander Rothacker

Starting in 2010, Oracle decreased the number of patches in the database with only 32 fixes reported. The trend continues in the first release of 2011 with only 6 database fixes out of 66 total fixes. The bulk of the other 60 fixes are in Oracle Fusion Middleware, PeopleSoft and Solaris...

Comments  (0)

1789975b05c7c71e14278df690cabf26

Getting Off the Patch

January 10, 2011 Added by:Pete Herzog

Patching is just one small part of the solution that includes Anti-virus, firewalls, intrusion detection systems, strong authentication, encryption, physical locks, disabling of scripting languages, reduced personal information on social networks,as part of a healthy lifestyle solution...

Comments  (13)

69dafe8b58066478aea48f3d0f384820

Mac Users Get Massive Security Wake Up Call

November 18, 2010 Added by:Headlines

Mac users, who have have long been used to lambasting Windows users over security issues, are getting a big dose of exploit reality this week as Apple releases fixes for 134 vulnerabilities. The record-breaking patch release for Mac OS dwarfs Microsoft's record of 49 patches...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Alert: New OpenSSL Vulnerability

November 18, 2010 Added by:Brent Huston

A new security issue in OpenSSL should be on the radar of your security team. Stunnel and Apache are NOT affected, many other packages appear to be. The issue allows denial of service and possibly remote code execution. Patches for OpenSSL and packages that use it are starting to roll in...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Small Businesses Need Protection from Security Threats

November 13, 2010 Added by:Dan Dieterle

Zero day exploits, which are previously unidentified software exploits that allow hackers complete remote access to your system, are found constantly. Keeping up with these can be a chore, but is a critical step in protecting your network...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Java Still Presents Soft Target for Malware Threats

November 13, 2010 Added by:Headlines

The exploit is still being proliferated despite the fact that a patch to prevent the infection has been available since July, which is evidence that users have not been as proactive about securing Java as regularly as they update Windows patches...

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Understanding and Selecting a Database Assessment Solution

November 09, 2010 Added by:Sasha Nunke

Database Assessment is not just a security precaution, but an integral part of database operations management. Databases form the backbone of every major application within the data center, which makes their stability and security both critically important to business operations...

Comments  (0)

F8f122d50eba11c3af5607575b277bc6

Pen Testing for Low Hanging Fruit - Part 6 of 7

November 02, 2010 Added by:Bryan Miller

Policies and procedures are often the IT stepchild and receive the least amount of effort. Nobody likes to write them and few people read them. But they are critical to the success of any information security and privacy plan and should drive the configuration of all security devices...

Comments  (0)

Page « < 1 - 2 > »