The Latest in IT Security

Posts Tagged ‘accesses’

Hello, welcome to this month’s blog on the Microsoft patch release. This month the vendor is releasing five bulletins covering a total of 23 vulnerabilities. Nineteen of this month’s issues are rated ‘Critical’.As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software […]

Read more ...

Hello, welcome to this month’s blog on the Microsoft patch release. This month the vendor is releasing 10 bulletins covering a total of 33 vulnerabilities. Eleven of this month’s issues are rated ‘Critical’.As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software […]

Read more ...

A new vulnerability found in Microsoft Internet Explorer affects Internet Explorer version 8.  The vulnerability allows attackers to execute code on a machine by just having the user visit a malicious website. This can happen, for example, when the user is tricked into clicking a link in an email or via compromised legitimate websites, such […]

Read more ...

Categories

THURSDAY, DECEMBER 13, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks