The zero-day threat is a serious one for any vendor or organisation to deal with and you should understand how it can defeat your technical defences. Here is a three-part mini-series that takes you through the zero-day threat in a straightforward way so you can make some decisions on how …
Why private needs to mean private
Public/Private Key encryption and security is one of the most powerful tools when it comes to building great cyber security – it is the security that the internet runs on. So when Microsoft reported a breach on a number of high profile Exchange Online mailboxes, no one expected that the …
Microsoft exploited vulnerability
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added a Microsoft Office/Windows HTML vulnerability to its Known Exploited Vulnerabilities Catalog. CISA Adds One Known Exploited Vulnerability to Catalog | CISA And from Microsoft: Storm-0978 attacks reveal financial and espionage motives | Microsoft Security Blog
The Zero-day Threat
I am involved in an IT/Cyber Security Audit this week – so I am pushed for time to produce articles a Wednesday article for Smart Thinking. Zero-day What I can give you is all three parts of my Zero-day mini-series that I completed last week: The Zero-day Threat – What …
Get that patching done
CISA – The US government Cybersecurity and Infrastructure Security Agency – is one of my trusted sources of information when it comes to software and firmware vulnerabilities and patching. Patching It is the week of Microsoft Patch Tuesday – here is the CISA advisory for Microsoft products: Microsoft Releases July …