
Pulse Secure Blog
650 FOLLOWERS
Pulse Secure, LLC is a leading provider of access and mobile security solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilize the company's Pulse virtual private network, network access control and mobile security products to enable workers mobility securely and seamlessly in their organizations. Pulse Secures mission is to deliver..
Pulse Secure Blog
2d ago
February Patch Tuesday is ramping up with releases from Adobe and Microsoft and an expected release from Google. Adobe resolved 45 CVEs across seven updates. The largest and highest priority is Adobe Commerce, which resolves 30 CVEs. Microsoft is coming down off a huge January release and only resolved 56 new CVEs this February. There are two new zero-day exploits and a revised Secure Boot zero-day in the mix, making the Windows OS a top priority this month.
Microsoft exploited vulnerabilities
Microsoft has resolved an Elevation of Privilege vulnerability in Windows Ancillary Function Driver f ..read more
Pulse Secure Blog
3d ago
New cybersecurity technologies and frameworks are always emerging, promising enhanced protection and streamlined operations. Among these, Security Service Edge (SSE) and Secure Access Service Edge (SASE) have gained significant attention for their comprehensive approach to network security.
But despite the advent of these sophisticated solutions, enterprise VPNs still hold enduring value for data and application security. Corporate enterprise VPNs can and should remain a cornerstone of cybersecurity strategies, even alongside newer technologies.
The foundation of enterprise VPNs
Enterprise VPN ..read more
Pulse Secure Blog
3d ago
In April 2024 the Ivanti CEO issued an open letter on our commitment to product security. We are very proud of the progress we have made, but as we all know, Security is a journey of continuous improvement. Ivanti is committed to this journey and to protecting our customers as the threat landscape continues to evolve.
Similar to other companies that develop network security and edge products, our edge products have been targeted and exploited by sophisticated threat actor attacks. While these products are not the ultimate target, they are increasingly the route that well-resourced nation state ..read more
Pulse Secure Blog
3d ago
Risk is inherent in any business. It’s how an organization understands and manages it that makes all the difference.
From operational challenges to market volatility, regulatory changes and technological advancements, companies face a spectrum of uncertainties that could either generate growth or lead to losses.
To effectively manage them, a business needs to set out a framework that helps it determine just how much risk it’s willing to accept in pursuit of its objectives. This is where the concept of "risk appetite" comes into play.
But to define its risk appetite, a company has to see and un ..read more
Pulse Secure Blog
1w ago
Currently, there are 500,000 vacant cybersecurity positions in the United States – affecting businesses and government agencies alike. And with the frequency, sophistication and intensity of cyberattacks increasing, including those directed at federal agencies and critical infrastructure, the need for government and industry to work together to train, retain and develop workers with the required technical expertise and skills has never been greater. According to Congressional sources, cyber attacks on critical infrastructure rose by 30 percent globally in 2023, creating a growing gap in the cy ..read more
Pulse Secure Blog
3w ago
The Five Ws and H — who, what, when, where, why and how — have long been used as a checklist in journalism to make sure a story covers every piece of essential information. The same concept is employed here to make sure all the essential information about exposure management is covered in this post.
Read on for a better understanding of exposure management (the Five Ws) and actionable guidance for implementing it (the H).
Who Who invented exposure management?
The term “exposure management” has been used in various contexts for decades, though it’s unknown when it was first used within the cont ..read more
Pulse Secure Blog
3w ago
Microsoft has released updates resolving 159 unique CVEs for January. Among the lineup are three zero-day exploits and five publicly disclosed vulnerabilities. The exploited CVEs are all targeting Windows Hyper-V NT Kernel Integration VSP, making the OS update this month your most urgent priority. The public disclosures impact Windows Themes, Windows App Package Installer and three CVEs for Microsoft Access. There are 10 CVEs rated Critical affecting the components of the Windows OS and Microsoft Excel.
Microsoft exploited vulnerabilities
Microsoft has resolved three Elevation of Privilege vul ..read more
Pulse Secure Blog
2M ago
In today’s dynamic cybersecurity environment, effectively managing vendor relationships is crucial for protecting digital assets. According to PwC’s 2022 Global Digital Trust Survey, 75% of executives reported that their organizations are overly complex, leading to concern about cyber and privacy risks.
Grand Bank, a prominent financial institution, faced similar challenges in monitoring and mitigating risks with its vendors. To address this, they partnered with Latest Solutions to implement Ivanti’s External Attack Surface Management (EASM). This provided Grand Bank with improved visibility i ..read more
Pulse Secure Blog
2M ago
Microsoft’s December Patch Tuesday release looks pretty straight-forward. They’ve resolved 70 new CVEs affecting Windows OS, Office, SharePoint, System Center Operations Monitor, Defender and a Microsoft AI project called Muzic.
Adobe has released several updates, including Acrobat and Acrobat Reader. For details on all 16 Adobe product updates, check out their security advisory page. Adobe has set all updates as a priority 3 this month.
Google Chrome has not released at the time of this blog but is expected to release soon.
Microsoft summary
While most of that lineup is pretty normal, the Mic ..read more
Pulse Secure Blog
3M ago
It’s no surprise to say that today’s digital business environment is incredibly dynamic. And the proliferation of distributed devices and applications has been a key part of that. The problem this has created? An increased exploitation of endpoint applications, jeopardizing data security and disrupting operations. Yet companies have limited security resources for coping with these risks.
But businesses can mitigate them by moving to the cloud. By adopting cloud-based endpoint protection, they can realize benefits including enhanced scalability, agility and access to dedicated security ex ..read more