IT Gets a Summer Vacation with Light Patch Load for June

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next IT Gets a Summer Vacation with Light Patch Load for June-12 Next

There are some updates to Windows Defender, including network behavior monitoring. This behavioral capability is great to see, supplementing signature-based technology that has been largely obsolete for some time now. It allows systems to make decisions based on known malicious behavior, even in the absence of a signature.

It’s a record month for Microsoft this month, according to Paul Henry, security and forensic analyst at Lumension. With just five bulletins, June marks the lowest number of bulletins we’ve seen from Microsoft to date this year, making it a light month for IT admins. It’s also the halfway point for the year, which is always a good time to look back at last year and compare. With 50 total bulletins for the year, Microsoft has issued a total of eight more bulletins this year than at the same time last year. Interestingly, the company has issued exactly the same number of critical bulletins so far this year at 16. That means the balance is made up of important bulletins, which are the type of bulletins we prefer to see.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.