As businesses rely more on software to deliver products and services, it is vital to secure their applications against threats such as code injection, data breaches, and privilege escalation.
Patching alone no longer stops breaches. Learn why CVE-based vulnerability management is failing and how runtime visibility reveals what’s truly exploitable in your environment.
Everyday tools like PDF readers, email clients, and archive utilities quietly define the real attack surface. Action1 explains how third-party software drift increases exploit risk and why consistent ...
Absolute Security, a leader in enterprise cyber resilience, today announced it is the only provider named as both a Leader and Outperformer in the 2025 GigaOm Radar for Patch Management Solutions. In ...
New Splashtop solution enhances remote support with automated patch management and security controls
Remote access and support startup Splashtop Inc. today announced a new autonomous endpoint management solution for remote support users seeking to improve efficiencies, visibility and control over ...
If you look at the past, patch management was not a cybersecurity issue; rather, it was an IT issue. And it wasn't until the emergence of Code Red in 2001 when Microsoft started issuing patches to ...
This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here. Procrastinating about patching has ...
Cloud security vulnerabilities are exposing enterprise workloads to exploited flaws. A new report urges exposure management ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results