As businesses rely more on software to deliver products and services, it is vital to secure their applications against threats such as code injection, data breaches, and privilege escalation.
Everyday tools like PDF readers, email clients, and archive utilities quietly define the real attack surface. Action1 ...
Absolute Security, a leader in enterprise cyber resilience, today announced it is the only provider named as both a Leader and Outperformer in the 2025 GigaOm Radar for Patch Management Solutions. In ...
New Splashtop solution enhances remote support with automated patch management and security controls
Remote access and support startup Splashtop Inc. today announced a new autonomous endpoint management solution for remote support users seeking to improve efficiencies, visibility and control over ...
Patching alone no longer stops breaches. Learn why CVE-based vulnerability management is failing and how runtime visibility reveals what’s truly exploitable in your environment.
If you look at the past, patch management was not a cybersecurity issue; rather, it was an IT issue. And it wasn't until the emergence of Code Red in 2001 when Microsoft started issuing patches to ...
This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here. Procrastinating about patching has ...
Patch management is becoming increasingly challenging as cyber threats evolve, IT environments grow more complex, and Patch Tuesday continues to introduce critical updates. In this webinar, you’ll ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results