LIVE ACTION1 PLATFORM DEMO

This Wednesday | 12 PM EDT / 4 PM CEST

The Air France-KLM data breach

The Air France-KLM data breach

According to Air France-KLM, details including customers’ names, email addresses, phone numbers, account numbers, and mileage balances might have been exposed.

read more
How to Create a Patch Management Policy

How to Create a Patch Management Policy

The first step in ensuring effective and reliable application of updates is to develop a solid patch management policy that spells out all the processes involved, along with all the participants and their responsibilities.
This article lays out the essential components for an effective policy and provides examples of how they should be written.

read more
Patch Management Crisis? How to Get Over It.

Patch Management Crisis? How to Get Over It.

If your company’s patch management process has been halted, where do you start to resolve the problem? How do you get the software upgrade process back to an optimal level after years of issues? Here is a detailed plan.

read more
August 2022 Vulnerability Digest from Action1

August 2022 Vulnerability Digest from Action1

Each month, we review the most serious vulnerabilities in popular Windows software for which patches were released during the past month, including those from Patch Tuesday.
In this issue, you will learn about patches for vulnerabilities from Microsoft, Microsoft Edge, Google Chrome, Mozilla Firefox, Foxit PDF Reader, Java, Adobe, VMware.

read more
What Is The Most Common Threat To Information Security In an Organization?

What Is The Most Common Threat To Information Security In an Organization?

As the business world grows ever more reliant on data and technology, the risk profile for many organizations continues to expand. Cybersecurity is by far the most disconcerting and widespread concern of the many different types of security risks to organizations. The Allianz Risk Barometer ranks cyber incidents (cyberattacks, IT outages, data breaches, etc.) as the number one business risk in 2022. For perspective, cyber threats are up there with business interruptions, natural catastrophes, pandemic outbreaks, and climate change.

read more
The 10 Most Common Types of Malware

The 10 Most Common Types of Malware

Malware infections are a dangerous form of cyberattack. The problem is that malware comes in different shapes and sizes, making it hard to pin them down, learn their malice, and prevent infections. This article looks and the different types of malware—what they are and how they work. We’ll also cover tips for protecting digital assets from malicious software.

read more