Configuration Management Planning
- May 13, 2016
DHS US-CERT warns of a patched SAP Java vulnerability from 2010 that has enabled breaches at three dozen global enterprises due to configuration issues.
- March 04, 2014
Experts say Microsoft's EMET security tool remains valuable to enterprise security teams if used as one layer in a larger security strategy.
- February 04, 2013
Oracle has issued an update to Java two weeks ahead of the normal schedule.
- September 29, 2012
Unpatched databases, misconfigured routers and more than 1,000 passwords were exposed in an Internet probe over 20 days by Metasploit creator HD Moore.
- January 16, 2012
While the RSA SecurID breach cost EMC’s security division more than $60 million, executives admit it could take years to restore its tarnished image.
- December 20, 2011
Danish vulnerability clearinghouse Secunia is warning of a highly critical memory corruption zero-day vulnerability that could be targeted by attackers. Proof-of-concept code has been published.
- October 13, 2011
Improperly configured network devices and the inability to measure the network security posture make most IT organizations incapable of finding gaps in their systems, according to a new survey.
- September 21, 2011
Amid emerging attack methods and the rollout of a new generation of BIOS, NIST offers guidelines to help enterprises reduce the risk of BIOS attacks.
- May 05, 2011
A new report produced by noted security researcher Marc Maiffret outlines free steps companies can take to greatly reduce the attack surface.
- August 23, 2010
Thoma Bravo said it signed an agreement to buy LANDesk Software from Emerson Electric to further build out its security market portfolio.
- May 27, 2009
EMC said it would move Configuresoft into its Resource Management Software Group. The software could detect configuration changes in both virtual and physical environments.
- May 15, 2009
The $47 million deal adds Solidcore's whitelisting technology to McAfee's product line up.
- March 19, 2008
Hannaford takes heat from officials who believe the supermarket chain was slow in disclosing its breach. Meanwhile, one of Hannaford's security vendors gets defensive.
- March 05, 2008
Security experts say IT pros should be more concerned about the risks created by misconfigured networks than all the flaws and exploit code they read about.
- April 26, 2007
The State Department hearings drew attention to the serious security problems that plague government networks. Federal security improvements will help push private sector progress.