The CrowdStrike outage illustrates a serious downside to automatic software updates. Get your software update policies and practices in check before the next major issue occurs.
read moreAffected by the JavaScript Polyfill.io cyberattack? Here's how to mitigate the situation before threat actors redirect your website visitors to scam sites to steal their info.
read moreIf cybercriminals can breach a MITRE network, is there any system they can’t reach? Read more about this cyberattack and what we recommend to prevent a similar incident from happening to you.
read moreCybersecurity is the number one risk to all industries. Read how the newest enhancements to Origina’s Vulnerability Advisory Portal 2.0 can help you in the battle against cyberthreats.
read moreOrigina’s latest Vulnerability Portal 2.0 provides the information you need to keep your digital assets secure.
read moreThe CVE-2023-44487 security vulnerability can cause Denial of Service on systems using HTTP/2 if exploited. Read more about this latest cyberattack.
read moreThe legacy software in your estate has a lot of life left to give if you take steps to secure it. And there are almost always steps you can take to harden the estate.
read moreHardening legacy software is tough without the right information in place. Three tips to keep your entire estate – not just the new stuff – secure.
read moreWhen it comes to cybersecurity, don’t just rely upon the old OEM patch/fix/upgrade cycle. Third-party software maintenance can provide a viable option.
read moreWhen it comes to cybersecurity, TPSM providers can offer an effective alternative to the old patch/fix/update of OEMs.
read moreThe cyber community is still dealing with the repercussions from the Apache Log4j security vulnerability from 2021. Experts agree the worst might be yet to come.
read moreAn in-depth look at Empower 2023 thought-provoking roundtables, interviews and bright ideas curated for IT, procurement, and software asset management professionals.
read more