SAP Releases July 2022 Security Updates

SAP Releases July 2022 Security Updates

This article is contributed. See the original author and article here.

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

SSL

Secure .gov websites use HTTPS

A lock (lock icon) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
SAP Releases July 2022 Security Updates

Citrix Releases Security Updates for Hypervisor

This article is contributed. See the original author and article here.

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

SSL

Secure .gov websites use HTTPS

A lock (lock icon) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

CISA Adds One Known Exploited Vulnerability to Catalog 

This article is contributed. See the original author and article here.

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column, which will sort by descending dates.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known CVEs that carry significant risk to the federal enterprise. BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the Catalog that meet the specified criteria.   

The Total Economic Impact™ of Microsoft cloud solutions for CMMC Compliance

This article is contributed. See the original author and article here.

 


Complying with the new Cybersecurity Maturity Model Certification (CMMC) from the Department of Defense (DoD) can be a challenge for customers and partners in the defense ecosystem.


 


The broad range of suppliers in the Defense Industrial Base (DIB) providing goods and services to the DoD need to navigate evolving compliance requirements. Microsoft cloud solutions are here to support DIB actors during this transition. Join Forrester and Microsoft on July 25th, 11am PT for this session to: Learn how to navigate the DoD’s CMMC compliance requirements, discover more about the benefits of Microsoft cloud services, like reducing audit-related efforts and get a look into Forrester’s Total Economic Impact™ of Microsoft cloud solutions. Register today