Смотрите также связанные темы 21.01.2018 Security and HIPER APARs fixed in DB2 for Linux, UNIX, and Windows Version 9.1 Fix Pack 6a Flash (Alert) Abstract Fix Pack 6a for DB2 V9.1 is now available which includes fixes for some serious vulnerabilities. These fixes, where applicable, are also available in Fixpak 3 for DB2 Version 9.5, Fix Pack 6 for DB2 Version 9.1, and FixPak 17 for DB2 Universal Database™ (DB2 UDB) Version 8.1 (also known as FixPak 10 for DB2 UDB Version 8.2), IBM® recommends that you review the vulnerability descriptions and deploy one of the above fix packs to remove the vulnerabilities on your affected DB2 installations. Content A set of secur...
09.04.2018 Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Adaptive Security Appliance and Cisco PIX Security Appliances -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA AdaptiveSecurity Appliance and Cisco PIX Security AppliancesAdvisory ID: cisco-sa-20090408-asahttp://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtmlRevision 1.0For Public Release 2009 April 08 1600 UTC (GMT)Summary=======Multiple vulnerabilities exist in the Cisco ASA 5500 Series AdaptiveSecurity Appliances and Cisco PIX Security Appliances. This securityadvisory outlines the details of these vulnerabilities: * VPN Authentication Bypass when Account Override F...
21.06.2018 Protecting Against Application-Specific Attacks We’ve seen an evolution from mass-mailing viruses to more targeted attacks and threats targeting OS vulnerabilities moving to attacks against applications. We’ve seen growth in attacks targeting systems that contain valuable data, including mission-critical enterprise applications sitting in virtual environments, SAP solution-based environments and storage systems. Companies must take these threats seriously and look for [...]
04.06.2018 Kerio Executive to Lead Mobile Email Session at Microsoft Tech-Ed North America 2008 IT Professionals Conference SAN JOSE, CA--(Marketwire - June 4, 2008) - Kerio Technologies, Inc., a provider of award-winning internet security and messaging software, today announced it will lead a Birds-of-a-Feather session at Tech-Ed North America 2008 IT Professionals Conference. Attendees will learn how to have a collaboration-centric enterprise infrastructure that has the freedom to choose virtually any email and calendar application and be able to synchronize data throughout the organization.
WHAT: Birds-of-a-Feather (BOF) Session titled, "Extending the Desktop to Mobile Devices Anytime, Anywhere"
WHO: Chris Pel...
26.09.2018 How to Spend Your Data Protection Dollars I was speaking last week at a panel of CISO’s when someone asked me the very reasonable question “What’s the most important thing we should do to protect our data?” – What the audience member wanted to know really was, given that he had no budget, and a state mandate impressing on him the [...]
10.10.2018 Data Protection News Roundup Recently it was reported that the UK MoD (Ministry of Defense) lost track of three USB backup drives containing the personal details of “potentially all current and ex-RAF personnel and dependents”.
Around 50,000 people’s details were lost reports Chris Mellor. The drives were lost despite being kept secure in a locked cupboard in a room protected [...]
30.10.2018 Focus-ing on Data Protection Last week, as many of you may know, was the inaugural McAfee user conference, snappily titled “Focus 2008.” At Focus, I had the honor of participating on one of the panels alongside some of our valued customers.
The subject of the panel was “Is it possible to get ROI on data protection projects?” I’ll cut [...]
04.12.2018 Faking Face Recognition This week CNET news reported on some interesting, new ways of bypassing facial recognition technology built into newer laptops. The reporter (Dong Ngo) published an interesting article which shows an easy way of bypassing the software from companies such as Lenovo, Toshiba and Asus that are shipped on popular laptops. By using a slightly modified [...]
16.12.2018 The Hidden Cost of Data Protection Companies today realize the threats and consequences of data loss, and by now most have some sort of data protection in place. But businesses that rushed into data protection for fear of losing precious information may have been too quick to throw together a patchwork quilt of security software that is now proving costly.
In the [...]
24.01.2018 Changing the paradigm again… In my travels and discussions with CIOs, CISOs and Risk & Compliance Officers, I hear time and again how companies struggle with a lack of time, resources and expertise when performing IT audits. I have a name for this condition - “audit fatigue,” where massive efforts are devoted to complete multiple IT security audits. Also, [...]
|