article thumbnail

What Is Patch Management and Why Is It Important?

SecureWorld News

Patch management, much like other cyber defense strategies such as vulnerability scanning, incident response, risk assessments, or penetration testing (pen-testing) , mustn't be viewed as a siloed exercise. In addition, organizational patch management relies heavily on clear top-level policies and standards that rely on systematic alignment.

article thumbnail

Today’s best CIOs are strategy wranglers

CIO Business Intelligence

Strategy today cannot be the top-down, C-suite exclusive exercise it has been in the past. Strategy is the operating system for “what is that.” CIOs have to make sure that the strategic “debate” happens and that all key stakeholders participate. Emerging from such debates should be a will to act.

Strategy 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

Penetration Tests and Red Team Exercises. href="[link] Control 20: Penetration Tests and Red Team Exercises. For more on the top four mitigation strategies see the DSD site at: [link] These four strategies are: Application Whitelisting: this makes it much harder for adversaries to run code on your systems.

Security 278
article thumbnail

Advisory: Malicious North Korean Cyber Activity

SecureWorld News

Keep operating system patches up-to-date. Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known. Exercise caution when using removable media (e.g., What are mitigation techniques for the new North Korea RAT? Disable File and Printer sharing services.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

It’s time to evolve beyond the UNIX operating system. So while I was editing this podcast on self-healing operating systems, I was reminded of an article that I never finished for Fobes.com. It’s a radical rethinking of how we even view our current choices of UNIX-derived operating systems.

article thumbnail

GlobalSign certificate revocation error leaves websites inaccessible

Network World

As part of a planned exercise, GlobalSign revoked one of its cross-certificates that allowed end-user certificates to chain to alternate root certificates. GlobalSign operates multiple roots, which are trusted in browsers and operating systems by default, and links them together through these cross-certificates.

article thumbnail

Lessons from the Synergy Forum: Affordability of Cybersecurity & Risk Management

CTOvision

For example, if an organization uses an outdated operating system in an effort to cut costs, it is highly unlikely that the same organization will utilize cybersecurity professionals to bolster its information security – it is not even exercising basic cybersecurity hygiene by using outdated software.