Vulnerabilities and Patches

A vulnerability is a weakness in a piece of software or a system that allows an attacker to violate the integrity of the product. Vulnerabilities can come from bad passwords, a virus or malware, among other things, and usually lead to the creation of a patch, a small piece of software designed to fix the problem. Microsoft releases security patches once a month, while other vendors have other schedules or release them as soon as possible after a vulnerability is disclosed.


Articles

CIOs Must Bleed Open Source

Many executives say open source gives their organization a competitive advantage, which is one of the reasons why CIOs need to better support open source initiatives. More >

How Enterprises Can Get Better Access to Real-Time Data

Here's a list of data points around a new approach to enterprise performance management. More >

A Crisis of Data Confidence

Many business executives lack confidence in the accuracy of the data they use for business decisions. IT needs to improve the quality of the data and develop self-service apps. More >

More Articles >

Interviews

XOEye Technologies Taking Wearables Beyond the Device

Wearable devices and applications developed specifically for the enterprise have potential for profound changes in the workplace and work itself.

More >

Pentaho’s Adaptive Big Data Layer Takes Broad View

Creates a native integration to multiple data sources.

More >

SnapLogic’s New Solution Targets Enterprise Integration via the Cloud

SnapLogic is targeting the line of business folks who are investing in and want to integrate SaaS applications.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Which Web Programming Language Is Most Secure?

Security Staffing

Take a deeper look into the security of a number of the most popular programming languages, including .NET, Java, ColdFusion and ASP.

 More >

Red Hat Outlines Container Strategy

The Green Data Center in the Real World

Riverbed SteelFusion 3.0 Provides Faster Branch Office Consolidation

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Contract Sample Business Intelligence Contract

“Getting Innovation Right: How Leaders Leverage Inflection Points to Drive Success,” written by Seth Kahan, re...

Managing the Configuration of Information Systems with a Focus on Security Managing the Configuration of Information Systems with a Focus on Security

Develop a well-defined process for managing and controlling secure system configurations and for managing risks in informatio...

Job Description: Open Source Developer Job Description: Open Source Developer

Evaluate your next Open Source developer candidate with the help of this sample job description....

System Integrity Best Practices

Software authenticity and the assurance of user identity are two key components of system integrity.

...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.