White Raven IT
White Raven IT
  • Contact Us
    • About Us
  • Infrastructure and design
    • Implementation
    • Selection and evaluation
  • Methodology and Process Consultation
  • Security
White Raven IT
White Raven IT
  • Contact Us
    • About Us
  • Infrastructure and design
    • Implementation
    • Selection and evaluation
  • Methodology and Process Consultation
  • Security

vulnerability

  • Home
  • Tag: vulnerability

According to Redlock, cryptojacking, account compromises, and a lack of high-severity patching are all making the outlook on using AWS potentially one of higher risk. Too many companies seem to be forgetting that security must extend to the cloud to guarantee that their data will be safe. This means moving the focus of many security […]

Read More
Cloud, Security
AWS, Business, Cloud, DevOps, vulnerability

For many of us, Intel has long been the “go-to” in processors, but these last few months have shown a few opening in the tech giant’s armor. This latest looks to be a minor issue, but businesses should remain aware – this could cause have some serious implications in environments where it is enabled. https://www.computerworld.com/article/3193830/security/vulnerability-hits-intel-enterprise-pcs-going-back-10-years.html […]

Read More
Infrastructure, Security
Business, firmware, Intel, Microsoft, vulnerability

Looks like a pretty simple attack could render it completely useless, are you willing to play the odds? https://motherboard.vice.com/en_us/article/3k4nd9/pgp-gpg-efail-vulnerability

Read More
Security
Business, Personal, personalsecurity, vulnerability

According to CyberArk’s latest findings, nearly half of the companies out there are not evolving once they put an InfoSec program into place – leaving them wide-open as attackers look for new ways to get in. Read more here: 46 Percent of Organizations Fail to Change Security Strategy After a Cyber Attack

Read More
Security
Business, vulnerability

Its no secret that cybersecurity is on everyone’s mind. Most companies are waking up to the stark truth that they need to hire staff to keep their data safe, but did you realize just how many open jobs there are for these positions? While you are looking to staff, the bad guys aren’t sleeping, so […]

Read More
Security
Business, internationalsecurity, nationalsecurity, vulnerability

The Colorado Department of Transportation was brought to its knees by SamSam this week. Are you vulnerable? Read more: https://www.2-spyware.com/samsam-ransomware-hit-colorado-department-of-transportation?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BUj3NSRhaR4CEVe4QjP8aJQ%3D%3D

Read More
Uncategorized
Business, Ransomware, vulnerability

If you still think that security can be something that you “get to as soon as…”, then you may already be in trouble. Too many companies pay little attention to the risk potential until it is too late, and the bad guys are well aware of it. Security is something that must be baked into […]

Read More
Security
internationalsecurity, personalsecurity, vulnerability

According to Thales threat report, breaches have risen for companies by about 36% this year, with 67% of respondents reporting one or more in their environment. Other findings include that the top three methods of preventing data loss and breaches are : Data-at-rest protection Network Security Data-in-motion protection Interestingly, the findings state that most companies […]

Read More
Security
Business, vulnerability

As new developments unfold in the Spectre saga – it appears that Intel shared the news about the vulnerability with Chinese interests before those in the USA – this could mean that threat actors in that region were able to react before we even knew about it. Regardless of the legal and international ramifications, White […]

Read More
Security
AWS, Business, Google, internationalsecurity, Malware, Meltdown, Microsoft, personalsecurity, Spectre, vulnerability

Spectre and Meltdown are major vulnerabilities, ones that could have very far-reaching implications. As Intel and the other chip manufacturers are figuring out exactly what to do about the loss of performance on their chips, the major providers of operating systems have all released guidance on how to best approach the problem. For now, the […]

Read More
Security
AWS, Citrix, Debian, Google, Linux, Meltdown, Microsoft, Red Hat, Spectre, Ubuntu, VMWare, vulnerability
Older Entries

©2018 White Raven, LLC