SCM for Linux/Unix Systems 46 minutes ago
|46 minutes ago|
Show us your Network Atlas maps! 1 month ago
|1 month ago|
|5 months ago|
|2 weeks ago|
|1 month ago|
Mission Accomplished: The Good, The Bad, and the Undetected
MISSION STATUS: COMPLETED Great dueling, THWACKsters! Your showdown was a tough one, but we told you we'd have your back. No one goes alone when you've got great security products more...
Silo-Busting and Dream-Dashing; More Fun With Automation
With the popularity of Agile methodologies and the ubiquity of people claiming they were embracing NetOps/DevOps, I could swear we were supposed to have adopted a new silo-busting software-defined more...
With an increasing regularity, vulnerabilities are requiring more than just standard Windows patching.
BIOS changes, firmware updates, and the trade-off between speed, efficiency, downtime vs security.
Most of the issues are in proof of concept stage and whilst vendors have released updates the sheer
volume of machines in some environments makes tackling the issue difficult to say the least.
Is it better to manage the risk and hope for the best, or take the hit and patch "All the things" or a mix of both,
identifying what's most important and doing those first?
Acknowledge the vulnerabities and accept the risk? (11%)17/143
PATCH ALL THE THINGS ? (57%)82/143
Take a piecemeal approach and best endeavours? (27%)40/143
Other (Please comment) (2%)4/143