Navigating Third-Party Patching Challenges:
Best Practices and Common Pitfalls

This Wednesday | 9AM PDT /11 AM EDT | 11 AM CEST / 10 AM BST

The Air France-KLM data breach

The Air France-KLM data breach

According to Air France-KLM, details including customers’ names, email addresses, phone numbers, account numbers, and mileage balances might have been exposed.

read more
Patch Management Crisis? How to Get Over It.

Patch Management Crisis? How to Get Over It.

If your company’s patch management process has been halted, where do you start to resolve the problem? How do you get the software upgrade process back to an optimal level after years of issues? Here is a detailed plan.

read more
August 2022 Vulnerability Digest from Action1

August 2022 Vulnerability Digest from Action1

Each month, we review the most serious vulnerabilities in popular Windows software for which patches were released during the past month, including those from Patch Tuesday.
In this issue, you will learn about patches for vulnerabilities from Microsoft, Microsoft Edge, Google Chrome, Mozilla Firefox, Foxit PDF Reader, Java, Adobe, VMware.

read more
What Is The Most Common Threat To Information Security In an Organization?

What Is The Most Common Threat To Information Security In an Organization?

As the business world grows ever more reliant on data and technology, the risk profile for many organizations continues to expand. Cybersecurity is by far the most disconcerting and widespread concern of the many different types of security risks to organizations. The Allianz Risk Barometer ranks cyber incidents (cyberattacks, IT outages, data breaches, etc.) as the number one business risk in 2022. For perspective, cyber threats are up there with business interruptions, natural catastrophes, pandemic outbreaks, and climate change.

read more
The 10 Most Common Types of Malware

The 10 Most Common Types of Malware

Malware infections are a dangerous form of cyberattack. The problem is that malware comes in different shapes and sizes, making it hard to pin them down, learn their malice, and prevent infections. This article looks and the different types of malware—what they are and how they work. We’ll also cover tips for protecting digital assets from malicious software.

read more