With Action1 being cash flow positive, experiencing hypergrowth, and being on track to soon reach $100 million ARR, the founders are confident in their ability to execute the long-term vision.
Top 6 Vulnerabilities: First Half of 2024 Review
Explore key vulnerabilities from first half of 2024, including critical risks in global systems and the urgency of prompt patching.
Patch Tuesday August 2024
In this issue: August 2024 Patch Tuesday updates, vulnerabilities found in Windows Kernel, Windows SmartScreen and in third-party vulnerabilities, including web browsers, Progress Software products, 1Password, Android, VMware ESXi, Zoho, Apple, Acronis Cyber Protect, etc.
How Action1 Preempts the Risk of IT Outages
We understand concerns from the CrowdStrike Incident. In this blog post, we explain how Action1 preempts outages and ensures reliability for our global customers.
Lessons from the Global CrowdStrike Incident
Explore the July 18 CrowdStrike incident: causes, impacts, and immediate workarounds and long-term solutions.
Streamline Patch Management with Advanced Custom Attributes
Optimize patch management with Action1’s custom attributes and PSAction1 for enhanced flexibility and centralized updates across your organization.
Leveraging Custom Attributes for Superior Patch Management
Explore Action1’s custom endpoint attributes designed to optimize patch management and enhance your IT operations on streamlining security and efficiency.
Patch Tuesday July 2024
In this issue: July 2024 Patch Tuesday updates, vulnerabilities found in third-party vulnerabilities, including Google Chrome, Mozilla Firefox, Android, OpenSSH, Splunk, CocoaPods for Swift, Cisco, Juniper, GitLab, FileCatalyst, Siemens, MOVEit Transfer, and VMware.
Patch Tuesday June 2024
In this issue: June 2024 Patch Tuesday updates, vulnerabilities found in third-party vulnerabilities, including Google Chrome, Mozilla Firefox, PHP, Azure, Check Point, GitHub, Rockwell, Veeam, Fluent Bit, and QNAP.
How to Securely Manage Local Administrator Accounts Without Using LAPS
Explore how to manage local admin accounts securely without LAPS, using Action1’s automated PowerShell script for endpoint security.
Effective Patching Strategies: A Real-Life Example
Learn from Chris, an IT admin who optimizes patching with Action1, ensuring secure and efficient operations.
KEV Catalog Integration: Enhancing Vulnerability Management
Explore Action1’s new KEV Catalog integration, accelerating critical security responses and enhancing vulnerability management across systems.
Patch Tuesday May 2024
In this issue: May 2024 Patch Tuesday updates, vulnerabilities found in third-party vulnerabilities, including Google Chrome, Mozilla Firefox, Intel, AMD Processors, Aruba, WordPress, Artificial Intelligence, Cisco, Ivanti, PuTTY, Palo Alto, and LG WebOS.
Action1 Excels as #1 Patch Management Solution in G2 Spring 2024 Reports
Action1 earned the top spot in multiple Spring 2024 Reports by G2, securing badges as a Momentum Leader, Best Usability, Best Results, Best Support, and more.
Why You Can No Longer Afford to Not Automate Patching
Explore the critical importance of proactive patch management in the wake of the recent MITRE compromise and why automating patch management is vital.
Handling Patch Tuesday’s LSASS Memory Leak
If you’re facing a memory leak in the LSASS process, in this blog post you will find a script that facilitates easy deployment of Microsoft’s out-of-band update to resolve the issue.
Patch Tuesday April 2024
In this issue: April 2024 Patch Tuesday updates, vulnerabilities found in third-party vulnerabilities, including Google Chrome, Mozilla Firefox, HTTP 2.0, Flowmon, Ivanti, Linux, Splunk, Anyscale Ray AI, Apple, GLPI, Fortinet, Atlassian, Fortra, Cisco, and Kubernetes.
The Slowdown of NVD Updates: Is the World of Cybersecurity Doomed?
The pace of updates to the National Vulnerability Database has slowed. If you rely on vulnerability management solutions, we have some bad news and good news.
Identifying Endpoints Vulnerable to CVE-2024-1708 & CVE-2024-1709
Given the escalating threat posed by CVE-2024-1708 & CVE-2024-1709 in ConnectWise ScreenConnect, Action1 has developed two scripts to assist in scanning systems for possible remote-control software as well as indicators of compromise specifically related to this vulnerability.
Patch Tuesday March 2024
In this issue: March 2024 Patch Tuesday updates, vulnerabilities found in third-party vulnerabilities, including Google Chrome, Mozilla Firefox, Jet Brains Team City, Zeek, VMware, Apple, Smart Toys, ConnectWise ScreenConnect, Joomla, SolarWinds, ESET, Linux, and Node.js.