cover

Mac Patch Management 101

To reduce the risk of vulnerabilities, IT administrators must ensure the devices they manage, which sometimes includes Mac devices, have the latest updates installed, even if support for Mac is not their major competency. 

In: #patching

What is Vulnerability Prioritization?

In an ideal world, security teams would remediate all vulnerabilities as soon as they are discovered, eliminating both small and large risks. However, zero inboxing in the world of vulnerability management is a mere pipe dream. 

In: #security

What is Virtual Patching?

This article will give you an insight into virtual patching, what makes patching hard for businesses, the value of virtual patching and how to fix virtual patching issues. Let’s get started.

In: #patching

A Step in the Right Direction – Binding Operation Directive 22-01

On November 3rd, 2021, the Cybersecurity and Infrastructure Security Agency released Binding Operational Directive 22-01, a compulsory direction with the goal of systematizing and standardizing vulnerability remediation across federal agencies except for defined “national security systems” and “certain systems operated by the Department of Defense or Intelligence Community.”

In: #topia

What is Risk-Based Vulnerability Management?

Risk-based vulnerability management is the process of reducing vulnerabilities across the attack surface of an organization’s assets by prioritizing remediation based on the risks they pose. 

In: #patching

Vicarius Offers New Technology To Fix Log4j With No Vendor Involvement

 

Vicarius Launches MacOS Patching Capability

There’s a patch for that.

In: #patching

How to Use Nmap

The most common issue with Internet systems is that they are too complex for the ordinary person to understand. Also, a small home-based system may be complex for some people. Consequently, when it comes to bigger agencies and large organizations that deal with lots of computers on the network, the complexity will increase.

Therefore, to learn which ports are open and the rules of engagement, a program called Nmap can be used. It’s a network scanning tool available for IT administrators, network administrators, systems administrators and other IT professionals. 

In: #security

Leave a Reply

    Categories

    See all

    Strong Cyber Hygiene is only One Click Away

    Want to take TOPIA for a free ride? Schedule A Meeting with our 🐺team!

    Let us know what would like to see 😀