by Terry Crowley | Nov 9, 2017 | InfoSec Strategies
Reading Time: 2 minutes
Yet another massive vulnerability that requires fast and widespread patching has just been announced: the KRACK (Key Reinstallation Attack) vulnerability, which exploits a handshake issue in the WPA2 Wi-Fi protocol. Thanks to KRACK,...
by Richard Barrus | Jul 21, 2017 | InfoSec Strategies
Reading Time: 2 minutes
The single most critical and effective measure for reducing cyber security risk is a robust patch management program that allows you to quickly and efficiently apply vendors’ software patches. Known vulnerabilities are a hacker’s...
by Terry Crowley | Apr 25, 2017 | InfoSec Strategies
Reading Time: 2 minutes
Many organizations take advantage of hardware virtualization, and VMware is a market leader in the virtual infrastructure space with its ESXi, vCenter and other offerings. Like Microsoft, VMware is security conscious and routinely...
by Taylor Smith | Apr 12, 2017 | InfoSec Strategies
Reading Time: 2 minutes
On March 7, 2017, the self-described “not-for-profit media organization” and whistleblowing website WikiLeaks began releasing the Vault 7 series of documents, which allegedly contain details about activities and capabilities of the...