Configuration Management Planning News
May 13, 2016
DHS US-CERT warns of a patched SAP Java vulnerability from 2010 that has enabled breaches at three dozen global enterprises due to configuration issues.
March 04, 2014
Experts say Microsoft's EMET security tool remains valuable to enterprise security teams if used as one layer in a larger security strategy.
February 04, 2013
Oracle has issued an update to Java two weeks ahead of the normal schedule.
September 29, 2012
Unpatched databases, misconfigured routers and more than 1,000 passwords were exposed in an Internet probe over 20 days by Metasploit creator HD Moore.
Configuration Management Planning Get Started
Bring yourself up to speed with our introductory content
A survey revealed 54% of enterprises don't know if they use code-execution prevention on networked endpoint devices. Does your organization? Continue Reading
A policy server is a security component of a policy-based network that provides authorization services and facilitates tracking and control of files... Continue Reading
If you're bedeviled by swarms of alerts, you can take control by practicing good security vulnerability management with these four steps. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Configuration Management Planning Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Reflections on the ICS CERT alert, Oracle’s handling of a zero-day and more. Continue Reading
Attacks on applications like Adobe Reader and Java require effective and timely patching of user systems. Continue Reading
Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Continue Reading
Manage Configuration Management Planning
Learn to apply best practices and optimize your operations.
Flawed machine learning models lead to failures and user interruptions. Expert Judith Myerson explains the causes for failures and how a failover plan can improve user experience. Continue Reading
Cybersecurity defense in depth needs to learn from the military strategy it originated from. Expert Peter Sullivan explains where cybersecurity should not deviate. Continue Reading
Expert Michael Cobb discusses whether EMET configuration issues should deter a security team from pushing for an enterprise EMET deployment. Continue Reading
Problem Solve Configuration Management Planning Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Does the latest Foxit Reader vulnerability mean it's time to find an alternative PDF reader? Expert Nick Lewis offers his advice. Continue Reading
Video: Keith Barker of CBT Nuggets demonstrates how Denim Group's ThreadFix helps simplify the enterprise vulnerability management process. Continue Reading
Is the Blacksheep technique a legitimate enterprise option for rootkit detection and cleanup? Expert Nick Lewis discusses. Continue Reading