vulnerability management
It's convenient to use the Remote Desktop Protocol (RDP) for accessing systems over the Internet, especially in server...Read more
Vulnerabilities in Adobe Reader are often pursued as part of both targeted and mass-scale exploitation campaigns....Read more
In an earlier note I discussed some of the ways in which network firewalls, WAFs and antivirus technologies can fail,...Read more
Considering that attackers have been successful at exploiting client-side vulnerabilities, enterprises should take the time...Read more
68% of computer users prefer to have dental surgery rather than install security updates on their laptops or desktops. OK,...Read more
Virtual patching is the process of addressing a security vulnerability by blocking an attack vector that could exploit...Read more