Twitter Feed
Yahoo-Microsoft Merger Proxy Fight – May 14, 2008
As I alluded to last week, “It’s not over ’till it’s over” Carl Ichan Looking to Start Yahoo Proxy Fight Money – The Microsoft-Yahoo Merger may not be over. Billionaire…
Now in the ring Sun/Amazon! – May 04, 2008
The Sun/Amazon cloud may be announced soon. Sun CEO Jonathan Schwartz delivered a short keynote at Startup Camp in San Francisco, an adjunct event to the JavaOne Conference. According to…
Microsoft gives up on Yahoo? – May 04, 2008
“Cloud computing is far more than a concept. With Broadband Internet connections now all-but-ubiquitous and microcomputers and locally-run software now so trouble-prone, Cloud Computing’s time has come.” This is a…
IBM, Google and the Blue Business Platform – May 01, 2008
Today was good !! This morning. there was a main session built around “CIO 2.0”. The basic premise was that CIOs have now earned a seat at the business management…
The coming cloud – April 30, 2008
I attended the IBM Public Sector briefing this morning. The IBM executives were clearly basking in a financial performance glow. After ending 2007 with increases in revenue, profit and earnings…
Google, Cloud Computing, and the US Intelligence Community – April 29, 2008
Just arrived in Los Angeles for the IBM Business Partner Leadership Conference. IBM is billing this as a “new” conference, but I have my doubts. I am, however, very interested…
Location Based Services – April 25, 2008
INmobile.org is a exclusive community for executives in wireless industry. As a member, I have the opportunity to participate in a number of interesting discussions about mobile and wireless technology.…
IBM Business Partner Leadership Conference – April 23, 2008
I just completed registration for the IBM Business Partner Leadership Conference. This is a new invitation-only conference being held this year in Los Angeles from Wednesday, April 30th through Friday,…
Telephone & Web = WOW !! – April 21, 2008
The power of the Internet and the web lies in its ability to provide access to information. The mobile web takes this one step further with its ability to provide…
According to the former Equifax CEO’s testimony to Congress, one of the primary causes of this now infamous data breach was the company’s failure to patch a critical vulnerability in the open source Apache Struts Web application framework. Equifax also waited a week to scan its network for apps that remained vulnerable.[1]Would you like to appear at the next Congressional hearing on patch management?
- Timing, prioritization, and testing of patches often present conflicting requirements. Competitive prioritization of IT resources, business imperative, andbudget limitations often leave patching tasks on the back burner
- Technical mechanisms and requirements for applying patches may also conflict and may include:
- Software that updates itself with little or no enterprise input
- Use of a centralized management tool
- Third-party patch management applications
- Negative or unknown interactions with network access control, health check functions, and other similar technologies
- User initiated manual software updates
- User-initiatedpatches or version upgrades
- Typical enterprise heterogeneous environment that includes
- Unmanaged or user managed hosts
- Non-standard IT components that require vendor patching or cannot be patched
- Enterprise owned assets that typically operate on non-enterprise networks
- Smartphones, tablets, and other mobile devices
- Patching of rehydrating virtual machines
- Firmware updates
- Maintaining current knowledge of available patches;
- Deciding what patches are appropriate for particular systems;
- Ensuring proper installation of patches;
- Testing systems after installation; and
- Documenting all procedures and any specific configurations.
- A detailed inventory of all hardware, operating systems, and applications that exist in the network and the creation of the process to keep the inventory up-to-date.
- A process to identify vulnerabilities in hardware, operating systems, andapplications.
- Risk assessment and buy-in from management and business owners.
- A detailed procedure for testing patches before deployment.
- A detailed process for deploying patches and service packs, as well as a process for verification of deployment.
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2016-2018)
Cloud Computing
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- Route1 Announces Q2 2019 Financial Results
- CPUcoin Expands CPU/GPU Power Sharing with Cudo Ventures Enterprise Network Partnership
- ChannelAdvisor to Present at the D.A. Davidson 18th Annual Technology Conference
Cybersecurity
- Route1 Announces Q2 2019 Financial Results
- FIRST US BANCSHARES, INC. DECLARES CASH DIVIDEND
- Business Continuity Management Planning Solution Market is Expected to Grow ~ US$ 1.6 Bn by the end of 2029 - PMR
- Atos delivers Quantum-Learning-as-a-Service to Xofia to enable artificial intelligence solutions
- New Ares IoT Botnet discovered on Android OS based Set-Top Boxes