By Mohamed Inshaff
This past week, the US National Security Agency (NSA) released a rare security advisory urging organisations to patch a list of critical vulnerabilities. The top 25 list detailed the software flaws most frequently being targeted by state-sponsored Chinese operatives. Although most CVEs were published in 2020, a few date back several years.
What does this tell us? That many organisations are still not patching systems promptly enough, even though the result of a major state-sponsored or cybercrime intrusion could be catastrophic. This is where virtual patching can save the day.
by Robin Purnell
Today, open source software powers some of the world’s largest organisations. But that in turn means it is a target for cyber-criminals and nation state actors. As one of the most popular Linux distributions out there, Red Hat Enterprise Linux (RHEL) is well regarded in security circles. Yet when iterations reach end-of-maintenance support, customers must act quickly to protect their servers.
This is where virtual patching capabilities could help to mitigate risk and extend the value of investments in RHEL.
by Ross Dyer
Another day, another warning of an impending cyber security crisis in the West. However, this time it’s come from the lips of former NSA and US Cyber Command boss General Keith Alexander. Last week he claimed that Western energy firms are unprepared for a potentially “catastrophic attack” on their infrastructure. The worst case scenario could involve a synchronised blitz on power plants, refineries and the national grid, possibly accompanied by a simultaneous attack on the banking system. Continue reading