Like right before our eyes
Thanks, Microsoft
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .
I’m on a bit of a staycation this week. But that doesn’t mean I can’t write my Dan’s New Leaf article.
One of the things I...
Artificial intelligence carries risk, but so does organic ignorance …
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .
At a recent conference, I noticed two camps emerging in the debate over artificial intelli...
infotex and GoTo
To all infotex managed security service Clients:
As recently reported by major news outlets there was a data breach affecting GoTo (formerly LogMeIn) wherein attackers stole encrypted backups containing customer information in November 2022. Based on t...
The cryptographic algorithm is vulnerable to attack and is no longer considered secure…
An article review.
NIST has announced that it plans to retire the SHA-1 cryptographic algorithm by the end of 2030, citing multiple vulnerabilities in the standard, effectivel...
Google Ads, Gitlab and OneDrive have been used to distribute the BATLOADER malware…
An article review.
We’ve always believed that “watch where you click” has always been good advice when it comes to security online, however Microsoft is tracking...
Microsoft, Cisco and Uber are among the companies hit by this new threat…
An article review.
As more organizations adopt multi-factor authentication to help safeguard their systems hackers have adapted, and several major corporations have been among those hit by ...
Over 85 percent of surveyed companies report having no centralized monitoring of networked industrial devices…
An article review.
If you are involved in IT within your organization, you’re probably aware of the importance of being able to monitor relevant ...
Software Bill of Materials (SBOMs) are becoming more and more important. . .
We are all very familiar with one aspect of the software supply chain – updates. New features, bug fixes, and performance upgrades are a regular occurrence to any device’s lifecycl...
Not just because it is becoming an issue of compliance. . .
We all know the plot of your typical heist movie – a group of robbers seeks out special bits of information, such as PIN numbers, keycards, FOBs, and even biometrics, all to relentlessly gain entry to a s...
infotex and Log4j
We are keeping our Clients’ safety in mind.
To all infotex managed security service Clients:
On Friday December 10th, infotex became aware of a zero-day vulnerability in the Apache Log4j library that allows unauthenticated remote code execution. ...