About Us | Contact Us
View Cart
Archive for 'Asset Management' Category

Don’t Believe Your Eyes: Router-Based Malware Can Change Website Data

By Vigilize - Last updated: Sunday, June 10, 2018

Previously thought to be designed to deliver a DDoS attack, VPNFilter can alter data in transit and change what you see on your screen. An article review. Initially, researchers thought that a new piece of router-based malware called VPNFilter was a relatively simple tool for directing and implementing a distributed denial of service (DDoS) attack. […]


Project Indigo: Blurring The Lines Between Government and Private Sector Cybersecurity

By Vigilize - Last updated: Sunday, May 27, 2018

US Cyber Command joins with the FS-ISAC to share threat intelligence… An article review. Threat intelligence sharing is a concept we’re all probably familiar with, at least in passing–it’s hard to imagine where we’d be without the efforts of organizations that work to identify and communicate new and developing threats! However, until relatively recently those […]


Hardware Bugs Pose a Lasting Threat

By Vigilize - Last updated: Sunday, May 6, 2018

Newly disclosed vulnerabilities highlight a concerning security trend… An Article Review. Over the winter, the Meltdown and Spectre vulnerabilities called the security risk posed by hardware bugs to the attention of the public…as well as hackers and security researchers. In the months since, as a new article from TechCrunch details, four new major hardware vulnerabilities […]


The Cost of Being Unprepared

By Vigilize - Last updated: Monday, April 30, 2018

A new study has identified the most profitable malware, showing just how much unprepared businesses have paid. An article review. Despite pleas from various experts and authorities, it looks like a significant number of organizations ultimately decide to pay the criminal organizations who have held their data hostage. That’s something that many people have probably […]


How Well Do You Know Your Endpoints?

By Vigilize - Last updated: Sunday, April 22, 2018

Many organizations spend time and money deploying endpoint protection, then think they can forget about it… An article review. Not too long ago when it came to endpoint security it was common practice to simply install an antivirus program, set it to automatically update and move on. That kind of hands-off approach has never ensured […]


Object Access Limitations

By Matt Jolley - Last updated: Monday, March 5, 2018

Object Access Limitations. . . While offering some visibility, there are limitations to object access monitoring. If your organization has to comply with industry regulations such as GLBA, HIPAA, or Sarbanes Oxley, you know that maintaining data security and privacy are important, and one of the ways you can accomplish that is with object access […]


The Difference Between Patch and Vulnerability Management

By Vigilize - Last updated: Thursday, January 18, 2018

The first in our guest author series, this article by Eric Kroeger and Jason Mikolanis explains the difference between patch and vulnerability management.


Understanding Patch Management

By Jolley | Hadaway - Last updated: Wednesday, January 10, 2018

It’s like a recall on your car… A Jolley | Hadaway Article. If you like to stay current on technology news, you’ve probably found it hard to ignore the recent stories about a major security problem with Intel processors, and the rush from software and hardware companies to mitigate the issue.  Most of the solutions […]


WPA2 Vulnerable To Attack

By Vigilize - Last updated: Friday, November 10, 2017

While Many Devices Have Already Been Patched, Many More May Never Be… An article review. When does exploit news cross the line into being a trend? How about when it impacts essentially every single wi-fi enabled device? That’s the takeaway from the recently announced vulnerability in the WPA2 wireless security standard, detailed in this TechCrunch […]


Cybersanity in the Incident Response Age

By Jolley | Hadaway - Last updated: Friday, November 3, 2017

Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!