Skip to content

What is Configuration Management?

Configuration management is an essential foundation for a successful technology platform. Leaders in the tech space will want to know what it takes to implement it. If that’s what you are searching for, we will discuss some important points in this article:

Continue reading

Vicarius & Log4Shell: What You Need to Know

Has Vicarius Been Affected by Log4Shell?

Along with the rest of the cybersecurity community, we have been continuously monitoring for any evidence of Log4Shell exploit attempts in our digital environment. So far, we have found no evidence that TOPIA or any of our systems have been affected by CVE-2021-44228 or CVE-2021-45046. It is also our current understanding that we are not vulnerable to either CVEs according to data gathered from extensive testing.

Continue reading

What is Automated Patching?

The easiest way to fix known vulnerabilities is through patching. The major challenges are often gaining approval from app owners and in executing the change approval process.

Continue reading

What is Risk-Based Vulnerability Management?

Risk-based vulnerability management is the process of reducing vulnerabilities across the attack surface of an organization’s assets by prioritizing remediation based on the risks they pose. 

Continue reading
×

Hello!

Click one of our contacts below to chat on WhatsApp

×