February 2025 Patch Tuesday
Pulse Secure Blog
by Chris Goettl
2d ago
February Patch Tuesday is ramping up with releases from Adobe and Microsoft and an expected release from Google. Adobe resolved 45 CVEs across seven updates. The largest and highest priority is Adobe Commerce, which resolves 30 CVEs. Microsoft is coming down off a huge January release and only resolved 56 new CVEs this February. There are two new zero-day exploits and a revised Secure Boot zero-day in the mix, making the Windows OS a top priority this month. Microsoft exploited vulnerabilities Microsoft has resolved an Elevation of Privilege vulnerability in Windows Ancillary Function Driver f ..read more
Visit website
Think SSE and SASE Make Enterprise VPNs Obsolete? Think Again
Pulse Secure Blog
by John Armstrong
3d ago
New cybersecurity technologies and frameworks are always emerging, promising enhanced protection and streamlined operations. Among these, Security Service Edge (SSE) and Secure Access Service Edge (SASE) have gained significant attention for their comprehensive approach to network security. But despite the advent of these sophisticated solutions, enterprise VPNs still hold enduring value for data and application security. Corporate enterprise VPNs can and should remain a cornerstone of cybersecurity strategies, even alongside newer technologies. The foundation of enterprise VPNs Enterprise VPN ..read more
Visit website
An Update on Ivanti's Ongoing Commitment to Enhanced Product Security
Pulse Secure Blog
by Daniel Spicer
3d ago
In April 2024 the Ivanti CEO issued an open letter on our commitment to product security. We are very proud of the progress we have made, but as we all know, Security is a journey of continuous improvement. Ivanti is committed to this journey and to protecting our customers as the threat landscape continues to evolve. Similar to other companies that develop network security and edge products, our edge products have been targeted and exploited by sophisticated threat actor attacks. While these products are not the ultimate target, they are increasingly the route that well-resourced nation state ..read more
Visit website
Understanding Risk Appetite – a Critical Component of Exposure Management
Pulse Secure Blog
by Robert Waters
3d ago
Risk is inherent in any business. It’s how an organization understands and manages it that makes all the difference. From operational challenges to market volatility, regulatory changes and technological advancements, companies face a spectrum of uncertainties that could either generate growth or lead to losses. To effectively manage them, a business needs to set out a framework that helps it determine just how much risk it’s willing to accept in pursuit of its objectives. This is where the concept of "risk appetite" comes into play. But to define its risk appetite, a company has to see and un ..read more
Visit website
US Federal Government's Role in Filling the Cybersecurity Talent Gap
Pulse Secure Blog
by Brooke Johnson
1w ago
Currently, there are 500,000 vacant cybersecurity positions in the United States – affecting businesses and government agencies alike. And with the frequency, sophistication and intensity of cyberattacks increasing, including those directed at federal agencies and critical infrastructure, the need for government and industry to work together to train, retain and develop workers with the required technical expertise and skills has never been greater. According to Congressional sources, cyber attacks on critical infrastructure rose by 30 percent globally in 2023, creating a growing gap in the cy ..read more
Visit website
The Five Ws (and H) of Exposure Management
Pulse Secure Blog
by Robert Waters
3w ago
The Five Ws and H — who, what, when, where, why and how — have long been used as a checklist in journalism to make sure a story covers every piece of essential information. The same concept is employed here to make sure all the essential information about exposure management is covered in this post. Read on for a better understanding of exposure management (the Five Ws) and actionable guidance for implementing it (the H). Who Who invented exposure management? The term “exposure management” has been used in various contexts for decades, though it’s unknown when it was first used within the cont ..read more
Visit website
January 2025 Patch Tuesday
Pulse Secure Blog
by Chris Goettl
3w ago
Microsoft has released updates resolving 159 unique CVEs for January. Among the lineup are three zero-day exploits and five publicly disclosed vulnerabilities. The exploited CVEs are all targeting Windows Hyper-V NT Kernel Integration VSP, making the OS update this month your most urgent priority. The public disclosures impact Windows Themes, Windows App Package Installer and three CVEs for Microsoft Access. There are 10 CVEs rated Critical affecting the components of the Windows OS and Microsoft Excel. Microsoft exploited vulnerabilities Microsoft has resolved three Elevation of Privilege vul ..read more
Visit website
Grand Bank's Success Story: Enhancing Vendor Management with Ivanti's External Attack Surface Management Solution
Pulse Secure Blog
by Steve Feldstein
2M ago
In today’s dynamic cybersecurity environment, effectively managing vendor relationships is crucial for protecting digital assets. According to PwC’s 2022 Global Digital Trust Survey, 75% of executives reported that their organizations are overly complex, leading to concern about cyber and privacy risks. Grand Bank, a prominent financial institution, faced similar challenges in monitoring and mitigating risks with its vendors. To address this, they partnered with Latest Solutions to implement Ivanti’s External Attack Surface Management (EASM). This provided Grand Bank with improved visibility i ..read more
Visit website
December 2024 Patch Tuesday
Pulse Secure Blog
by Chris Goettl
2M ago
Microsoft’s December Patch Tuesday release looks pretty straight-forward. They’ve resolved 70 new CVEs affecting Windows OS, Office, SharePoint, System Center Operations Monitor, Defender and a Microsoft AI project called Muzic. Adobe has released several updates, including Acrobat and Acrobat Reader. For details on all 16 Adobe product updates, check out their security advisory page. Adobe has set all updates as a priority 3 this month. Google Chrome has not released at the time of this blog but is expected to release soon. Microsoft summary While most of that lineup is pretty normal, the Mic ..read more
Visit website
Reduce application exploitation opportunities with cloud endpoint security protection
Pulse Secure Blog
by Gary McAllister
3M ago
It’s no surprise to say that today’s digital business environment is incredibly dynamic.  And the proliferation of distributed devices and applications has been a key part of that. The problem this has created? An increased exploitation of endpoint applications, jeopardizing data security and disrupting operations. Yet companies have limited security resources for coping with these risks. But businesses can mitigate them by moving to the cloud. By adopting cloud-based endpoint protection, they can realize benefits including enhanced scalability, agility and access to dedicated security ex ..read more
Visit website

Follow Pulse Secure Blog on FeedSpot

Continue with Google
Continue with Apple
OR