Blog Search Blog results All Business Consulting Cloud Hitachi Maintenance Ultima Workspace Ultima Labs Check Point Cisco Citrix VMware Microsoft Security SD-WAN Partner Pulse Managed Services Data Intelligent Automation IA-Cloud Hewlett Packard Enterprise GDPR Disaster Recovery DevOps Data Centre … blog Security Critical Windows Vulnerability that uses the inbuilt support tool Ultima have been made aware about the Microsoft Zero-Day Vulnerability – Read more blog Security Safer Internet Day: The rise of Software Supply Chain Attacks Software supply chain attacks infamously made it to mainstream media back in December 2020 due to the now … Read more blog Security Critical Vulnerability found in Linux - Polkit Privilege Escalation (CVE-2021-4034) We’ve been made aware of a critical vulnerability on the pkexec process that can be found in a large amoun… Read more blog Security Critical Vulnerability: Apache Log4j/LogJam Ultima have been made aware of a critical vulnerability which affects Log4j and is designated a 10 on the … Read more blog Security Securing the work-from-anywhere-world With millions of employees working remotely and increasingly using home devices to connect to the corporat… Read more blog Security Protect your Azure connections & SaaS apps across the globe With over 22 billion records exposed to data breaches in 2020 (Tenable), ensuring a robust security policy… Read more blog Security Remote working- a ticking time bomb for security? Over the past 18 months, organisations were forced to rapidly transform in order to maintain business cont… Read more blog Security Critical Vulnerability: Windows (CVE-2021-40444) We’ve been made aware of a critical vulnerability which would allow an attacker to gain control of a PC vi… Read more blog Security Building Cyber Resilience with Zero Trust Whether caused by malicious code deployed by sophisticated cybercriminals, weak passwords or simply user e… Read more blog Security Defend against the most targeted platform in the world The most targeted platform in the world demands the best email security. The challenge Read more blog Security The importance of converging cyber & physical security for true threat protection As the proliferation of IoT devices increases and the threat landscape becomes increasingly complex, organ… Read more blog Security Vulnerability in the Windows Print Spooler Service We’ve been made aware of a new remote code execution vulnerability in the Windows Print Spooler which is c… Read more Pagination Page 1 Next page ››
blog Security Critical Windows Vulnerability that uses the inbuilt support tool Ultima have been made aware about the Microsoft Zero-Day Vulnerability – Read more
blog Security Safer Internet Day: The rise of Software Supply Chain Attacks Software supply chain attacks infamously made it to mainstream media back in December 2020 due to the now … Read more
blog Security Critical Vulnerability found in Linux - Polkit Privilege Escalation (CVE-2021-4034) We’ve been made aware of a critical vulnerability on the pkexec process that can be found in a large amoun… Read more
blog Security Critical Vulnerability: Apache Log4j/LogJam Ultima have been made aware of a critical vulnerability which affects Log4j and is designated a 10 on the … Read more
blog Security Securing the work-from-anywhere-world With millions of employees working remotely and increasingly using home devices to connect to the corporat… Read more
blog Security Protect your Azure connections & SaaS apps across the globe With over 22 billion records exposed to data breaches in 2020 (Tenable), ensuring a robust security policy… Read more
blog Security Remote working- a ticking time bomb for security? Over the past 18 months, organisations were forced to rapidly transform in order to maintain business cont… Read more
blog Security Critical Vulnerability: Windows (CVE-2021-40444) We’ve been made aware of a critical vulnerability which would allow an attacker to gain control of a PC vi… Read more
blog Security Building Cyber Resilience with Zero Trust Whether caused by malicious code deployed by sophisticated cybercriminals, weak passwords or simply user e… Read more
blog Security Defend against the most targeted platform in the world The most targeted platform in the world demands the best email security. The challenge Read more
blog Security The importance of converging cyber & physical security for true threat protection As the proliferation of IoT devices increases and the threat landscape becomes increasingly complex, organ… Read more
blog Security Vulnerability in the Windows Print Spooler Service We’ve been made aware of a new remote code execution vulnerability in the Windows Print Spooler which is c… Read more