by Bharat Mistry
If nothing else, the past year has shown us that the traditional network perimeter as we knew it is now gone. Today’s organisations run a complex blend of remote working endpoints, cloud applications and servers alongside their traditional on-premises assets. This inevitably creates new security and compliance challenges, because all the operating systems and software that run on these endpoints need continual patching against new malware exploits. Fail in this, and CISOs run the risk of a potentially serious security incident that could lead to widespread disruption and financial and reputational damage.
The problem is that patching is not as easy as it sounds. This is where virtual patching can help.
by Toby Hart
Over the past few days, one story in the US has threatened to overshadow even the race for the White House. A set of apparently coordinated ransomware attacks reportedly hit hundreds of hospitals, medical facilities and clinics. Although no warnings have thus far been issued by the National Cyber Security Centre (NCSC) or NHS Digital, UK hospitals should be alert to the malicious campaign potentially spreading their way, and of other attackers targeting medical facilities already stretched to the limit with the fight against COVID-19.
The good news is that by detecting the early warning signs including the presence of TrickBot and/or Emotet Trojans, healthcare organisations (HCOs) can mitigate the threat before it has a chance to make a major impact.
By Mohamed Inshaff
This past week, the US National Security Agency (NSA) released a rare security advisory urging organisations to patch a list of critical vulnerabilities. The top 25 list detailed the software flaws most frequently being targeted by state-sponsored Chinese operatives. Although most CVEs were published in 2020, a few date back several years.
What does this tell us? That many organisations are still not patching systems promptly enough, even though the result of a major state-sponsored or cybercrime intrusion could be catastrophic. This is where virtual patching can save the day.
by Robin Purnell
Today, open source software powers some of the world’s largest organisations. But that in turn means it is a target for cyber-criminals and nation state actors. As one of the most popular Linux distributions out there, Red Hat Enterprise Linux (RHEL) is well regarded in security circles. Yet when iterations reach end-of-maintenance support, customers must act quickly to protect their servers.
This is where virtual patching capabilities could help to mitigate risk and extend the value of investments in RHEL.