IT Gets a Summer Vacation with Light Patch Load for June

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next IT Gets a Summer Vacation with Light Patch Load for June-9 Next

Another important feature that is of particular interest to Henry as a forensic professional is the encryption feature using the TCM chip in Windows. This encryption is enabled by default. This is great for users, but for forensics and incident response folks charged with removing data from devices on behalf of law enforcement, this could make their jobs a little more difficult. It’s similar to the default encryption on the iPhone 5. However, there’s a three- to seven-month delay from Apple for law enforcement requests for decryption. In cases such as a missing child, where time is of the essence, this is particularly troubling. With Microsoft also adding this capability, the days of “knock and look,” where law enforcement can gain immediate access to data to solve crimes, may be over. It is Henry’s hope that Microsoft is able to avoid that same issue, perhaps by providing a decryption key to law enforcement.

It’s a record month for Microsoft this month, according to Paul Henry, security and forensic analyst at Lumension. With just five bulletins, June marks the lowest number of bulletins we’ve seen from Microsoft to date this year, making it a light month for IT admins. It’s also the halfway point for the year, which is always a good time to look back at last year and compare. With 50 total bulletins for the year, Microsoft has issued a total of eight more bulletins this year than at the same time last year. Interestingly, the company has issued exactly the same number of critical bulletins so far this year at 16. That means the balance is made up of important bulletins, which are the type of bulletins we prefer to see.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.