• +1.800.374.4353
  • Contact Us
  • Search
Blogs
Flexera Blog
    • Search
  • Topics
    • Application Readiness
    • Cloud Management
    • Data Platform
    • Software License Optimization
    • Software Vulnerability Management
    • IT Industry Trends
  • Subscribe
    • Get updates delivered to your inbox:
    • Follow Us:  
  • Authors
  • flexera.com

How ITAM can close the door on asset vulnerabilities

Software either is or will be vulnerable. It’s rare that you won’t have to update out-of-date, unsupported or end-of-life software. If your job description involves software or IT asset manageme…

December 14, 2020 Kevin Miller

Cyber risks of working from home – Maintaining control over your IT environments

Working from home (WFH) has taken over as the new normal for employees at many organizations. Whether your outlook for extended WFH and social distancing is glass-half-full or half-empty, if you’re in…

April 30, 2020 Kevin Miller

Discover Intelligent Patch Automation for Your Software Vulnerability Management

Your organization is unique. So is your IT team and their approach to managing the IT estate. But what isn’t unique are the vulnerabilities in your environment. They affect every organization. And in …

April 3, 2020 Kevin Miller

One Patch Tuesday to Rule Them All

On the second Tuesday of each month, many IT leaders rejoice—or maybe cringe, depending on their view—as software patches are released for Microsoft products. They call this day Patch Tuesday, and alt…

February 6, 2020 Kevin Miller

Save Time and Money by Enabling IT Staff to Update Software Better and Faster 

You need new and updated software deployed throughout your organization constantly. Security updates, replacement of software that has reached end of life, new releases, application migration efforts …

December 6, 2019 Bob Kelly

The process of deciding the relative importance of a thing

What does your to do list look like? If it’s anything like mine, it includes things like grocery shopping, laundry, buying dog food, putting gas in the car, sweeping the floor, walking the dog, and cooking dinner. Colloquial wisdom holds that a good number of to do items for each day is roughly 6-12 items, assuming that each take 30 minutes to an hour. That’s nice and all… but we haven’t even gotten to my work to-do list. So how, as humans, do we…

June 5, 2019 Flexera

What Sugar Ray Leonard Can Teach Us About Cybersecurity

We can’t take this analogy too far, but do you remember the historic 1980 “no mas” fight between Sugar Ray Leonard and Roberto Durán? If you haven’t watched it, you can see it on YouTube. In this part…

June 3, 2019 Alejandro Lavie

CVE-2019-0708: Winter Doesn’t Have to Come Today

For those of you not in love with Game of Thrones Season 8 (see the petition asking HBO to redo this season), Microsoft Patch Tuesday is offering its own degree of dramatic flare. On Tuesday, May 14, Simon Pope, Director of Incident Response, Microsoft Security Response Center (MSRC) wrote the blog post, “Prevent a worm by updating Remote Desktop Services (CVE-2019-0708). He said, “In other words, the vulnerability is ‘wormable’, meaning that any…

May 21, 2019 Flexera

Recent RDS Vulnerability, and What EOL Software Means for You

Once again, a vulnerability has been discovered in older Microsoft Windows operating systems that will likely lead to some long nights and grumpy IT personnel. When a situation like this presents itself the first thing that should be done is to take a deep breath (seriously, calm down) and secondly to review the latest assessment of the hosts in your environment. Hopefully one has access to details about the operating systems in use, how many the…

May 20, 2019 Dylan Hudak

Introducing: Threat Intelligence Module

A new module is now available for our software vulnerability management solutions. It is called the Threat Intelligence Module and it takes your ability to focus on the vulnerabilities that matter mos…

March 29, 2019 Bob Kelly

  • 1
  • 2
  • 3
  • »
  • Recent Posts

  • Popular

  • How ITAM can close the door on asset vulnerabilities
  • Cyber risks of working from home – Maintaining control over your IT environments
  • Discover Intelligent Patch Automation for Your Software Vulnerability Management
  • One Patch Tuesday to Rule Them All
  • Save Time and Money by Enabling IT Staff to Update Software Better and Faster 

    Top Posts & Pages

    • An Introduction to Microsoft SQL Server Licensing
    • Comparing Cloud Instance Pricing: AWS vs Azure vs Google vs IBM
    • AWS vs Azure vs Google Cloud Pricing: Compute Instances
    • Hundreds of products to hit EOL/EOS by the end of 2018
    • Amazon's Elastic Block Store Explained
    • 2020 State of Tech Spend: IT Spending Benchmarks and Trends
    • VMware Cloud on AWS Pricing: Is It Really Cheaper Than AWS?
    • Microsoft Ends Support for Integral Products in 2020
    • Microsoft SQL Server Licensing – A Deeper Look
    • Future of Software Packaging: Expert Answers to MSIX Questions

Topics

  • Application Readiness
  • Cloud Management
  • Data Platform
  • Software License Optimization
  • Software Vulnerability Management
  • IT Industry Trends

Tweets by Flexera

Tags

Apache Struts Application Compatibility Application Readiness Application Virtualization Archive Cloud Computing Cloud Cost Cloud Cost Analysis Cloud Industry Insights Cloud Management Best Practices cloud spend CMDB Data Data Quality Desktop Transformation Digital Transformation Enterprise Enterprise App Stores Enterprise Cloud Strategies Executive Federal Flexera News IBM software licensing IT Asset Management IT Industry Trends Microsoft software licensing Mobile Applications Oracle software licensing SaaS SaaS IT Spend SAM and Security SAP software licensing Security Software Asset Management Software budget planning Software license agreements Software license compliance Software License Optimization Software spend management Software Vulnerabilities Technopedia Vulnerability Windows 7 Windows 8 Windows 10
Search
About the Software Vulnerability Management blog

Software Vulnerability Management is a resource for IT security and operations professionals to help them identify, prioritize and remediate software vulnerabilities and cybersecurity risks.

Updates in your inbox

Give us your email and we’ll keep you in the loop

Get In Touch
  • +1 (800) 374-4353
  • Contact Us
  • Careers
  • Support
Stay Connected
Other Sites
  • Flexera.com
  • Customer Community
© 2021 Flexera. All rights reserved.    Terms and Conditions    Privacy Policy