THE ORIGINA BLOG

New Features Enhance Cybersecurity Vulnerability Advisory Portal 2.0

New Features Enhance Cybersecurity Vulnerability Advisory Portal 2.0

Cybersecurity is the number one risk to all industries. Read how the newest enhancements to Origina’s Vulnerability Advisory Portal 2.0 can help you in the battle against cyberthreats.

read more
Removing the Fear of Cybersecurity Risk: Origina’s Vulnerability Advisory Portal 2.0

Removing the Fear of Cybersecurity Risk: Origina’s Vulnerability Advisory Portal 2.0

Origina’s latest Vulnerability Portal 2.0 provides the information you need to keep your digital assets secure.

read more
CVE-2023-44487: IBM Vulnerability Warning for HTTP/2 Rapid Reset Attack

CVE-2023-44487: IBM Vulnerability Warning for HTTP/2 Rapid Reset Attack

The CVE-2023-44487 security vulnerability can cause Denial of Service on systems using HTTP/2 if exploited. Read more about this latest cyberattack.

read more
Examining the Risks of Running Unsupported Software

Examining the Risks of Running Unsupported Software

The legacy software in your estate has a lot of life left to give if you take steps to secure it. And there are almost always steps you can take to harden the estate.

read more
Hardening Legacy Software: Three Steps to Improving Cybersecurity

Hardening Legacy Software: Three Steps to Improving Cybersecurity

Hardening legacy software is tough without the right information in place. Three tips to keep your entire estate – not just the new stuff – secure.

read more
Is Your Software Protected from Potential Cybersecurity Attacks?

Is Your Software Protected from Potential Cybersecurity Attacks?

When it comes to cybersecurity, don’t just rely upon the old OEM patch/fix/upgrade cycle. Third-party software maintenance can provide a viable option.

read more
OEM or TPSM: Who Has Better Cybersecurity Protection?

OEM or TPSM: Who Has Better Cybersecurity Protection?

When it comes to cybersecurity, TPSM providers can offer an effective alternative to the old patch/fix/update of OEMs.

read more
Potential Issues Linger for Log4j Security Vulnerability

Potential Issues Linger for Log4j Security Vulnerability

The cyber community is still dealing with the repercussions from the Apache Log4j security vulnerability from 2021. Experts agree the worst might be yet to come.

read more
The Year of the Healthy Skeptic: A New Way of Thinking for IT Leaders

The Year of the Healthy Skeptic: A New Way of Thinking for IT Leaders

An in-depth look at Empower 2023 thought-provoking roundtables, interviews and bright ideas curated for IT, procurement, and software asset management professionals.

read more
CVE-2023-23477: IBM WebSphere Vulnerability Information and Remediation Advice

CVE-2023-23477: IBM WebSphere Vulnerability Information and Remediation Advice

A new, potentially high-severity IBM® Websphere vulnerability has been published and is ready to give your business another headache. Harden your perimeter with advice from our cybersecurity team.

read more
Rethinking Patch-First Approach: Effective Strategies for Securing Your Business Technology

Rethinking Patch-First Approach: Effective Strategies for Securing Your Business Technology

Software security patches can’t consider your unique business and technology context. When securing your software estate, a fuller view of security and performance is necessary. Learn more about a multi-layer approach that does more than tick a box.

read more
Cybersecurity Rated No. 1 Risk to Business in 2022

Cybersecurity Rated No. 1 Risk to Business in 2022

Risk management experts rate cybersecurity as the biggest problem affecting businesses today. Here are a few strategies to safeguard your systems.

read more