[On-Demand Webinar] Getting to Know Microsoft’s New Packaging and Deployment Technology

Microsoft’s Windows Installer technology has assisted many organizations and IT Pros well over the years, providing a standard for application customization deployment and, in many cases, serving as sole expertise for many careers. As we move into the next level of technology evolution brought on by cloud virtualization and containerization, the old Windows Installer technology… Read More [On-Demand Webinar] Getting to Know Microsoft’s New Packaging and Deployment Technology

Achieve Visibility, Prioritize Efforts and Remediate Vulnerabilities with Flexera

Adminstudio 2018 – Watch this “What’s New” webinar to learn about: App Risk Module your first line of defense against application vulnerabilities. Automated scanning identifies vulnerabilities in your application portfolio Automatic Virtualization for compatibility testing, conversion, validation, editing, and management reporting to ensure a faster and more reliable deployment Mac Application Management to automatically assess… Read More Achieve Visibility, Prioritize Efforts and Remediate Vulnerabilities with Flexera

Software Vulnerabilities: Risk Challenges

With vulnerabilities continuously on the rise reaching all new record highs, the struggle to keep risk is more complicated than ever. The best way to fix these vulnerabilities is to prioritize them.  That’s where Flexera comes in.  Flexera’s technology on their Software Vulnerability Management tool helps achieve visibility, prioritizes efforts and remediates vulnerabilities faster and… Read More Software Vulnerabilities: Risk Challenges

10 Ways to Improve Security Compliance with Data Privacy Regulations

Rapid technology advances have brought new challenges for the protection of personal data. Every organization must have a comprehensive approach to privacy management and document how they collect, process, and store personal data. But too many companies still fall down on the security fundamentals. New regulations make the cost of failure far greater than it… Read More 10 Ways to Improve Security Compliance with Data Privacy Regulations

Flexera Releases InstallShield 2018!

 NEW Open Source Software Detection and Risk Assessment Make InstallShield your first line of defense against Apache Struts 2 and other known OSS vulnerabilities. One fast, automated scan identifies OSS components in your project. Know your license obligations and make informed ship/no-ship decisions. *Flexera’s FlexNet Code Aware  is the power behind the OSS scan, which… Read More Flexera Releases InstallShield 2018!

Every Modern Processor is Vulnerable to Meltdown and/or Spectre

This week, details have emerged on serious flaws in processors that allows hackers to steal sensitive data, including passwords and banking information. The vulnerabilities – dubbed Meltdown and Spectre – are known to affect ARM, AMD and other chips. Meltdown is easier to exploit. While the news has become public this week, some tech companies have known about these vulnerabilities… Read More Every Modern Processor is Vulnerable to Meltdown and/or Spectre