|
|
Please register below to view the archive of this webinar.
How to Reduce the Cost & Complexity of Patch Management
Sponsors: PatchLink
Host: Tim Wilson, Dark Reading, and Gabriel Selmi, Network Administrator, Advanced Behavioral Health
Original Webinar Date: Thursday, June 22, 2006
Original Webinar Time: 2:00 p.m. New York / 7:00 p.m. London
Overview: Network security is becoming more complicated and expensive as the number of threats and vulnerabilities to networks increases year after year. The endless stream of software patches that help ensure network security can overwhelm the resources of an IT department with testing and implementation.
Attend this Webcast and learn how Advanced Behavior Health (ABH), a healthcare company requiring 24/7 uptime with multiple locations and internal and external end points, met the challenge to develop a patch management process to secure its network and protect client data.
Join Gabriel Selmi, Network Administrator for Advanced Behavioral Health, as he shares the challenges, approach, benefits, and lessons learned in developing a security patch and vulnerability management process for ABH. Hear how to:
- Minimize IT resources through an automated patch management process
- Accurately assess and continuously monitor the health of a network
- Easily demonstrate patch compliance-based internal and external policies and regulations
- Lessons learned in developing an effective patch management process
Archive Registration
Webinar: How to Reduce the Cost & Complexity of Patch Management
To view the archive for this Webinar, please complete the form below. Take care to provide all required information (indicated in red). Press Register to access this Webinar Archive to complete your registration. If you have already registered for our site or for one of our webinars, you may login to register without re-entering your information.
Registering to view the archive of this Webinar entails your agreement to the Webinar Agreement displayed at the bottom of this form.
|
|
|
|
|
|
|
|
|
|
|
ENTERPRISE VULNERABILITIES |
|
|
|
Vulnerability: Dimension of phpBB Dimension of phpBB Published: 2006-10-12 Severity: HIGH Description: Multiple PHP remote file inclusion vulnerabilities in Dimension of phpBB 0.2.6 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter in (1) includes/themen_portal_mitte- .php or (2) includes/logger_engine.php.
|
|
|
|
Vulnerability: Cahier de textes Cahier de textes Published: 2006-10-12 Severity: HIGH Description: Multiple SQL injection vulnerabilities in Cahier de textes 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) matiere_ID parameter in lire.php or the (2) classe_ID parameter in lire_a_faire.php.
|
|
|
|
Vulnerability: Objective Development WebYep Published: 2006-10-12 Severity: HIGH Description: Multiple PHP remote file inclusion vulnerabilities in WebYep 1.1.9, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via the webyep_sIncludePath in (1) files in the programm/lib/ directory including (a) WYApplication.php, (b) WYDocument.php, (c) WYEditor.php, (d) WYElement.php, (e) WYFile.php, (f) WYHTMLTag.php, (g) WYImage.php, (h) WYLanguage.php, (i) WYLink.php, (j) WYPath.php, (k) WYPopupWindowLink.php, (l) WYSelectMenu.php, and (m) WYTextArea.php; (2) files in the programm/elements/ directory including (n) WYGalleryElement.php, (o) WYGuestbookElement.php, (p) WYImageElement.php, (q) WYLogonButtonElement.php, (r) WYLongTextElement.php, (s) WYLoopElement.php, (t) WYMenuElement.php, and (u) WYShortTextElement.php; and (3) programm/webyeb.php.
|
|
|
|
Vulnerability: Moodle Moodle Published: 2006-10-12 Severity: MEDIUM Description: SQL injection vulnerability in blog/index.php in the blog module in Moodle 1.6.2 allows remote attackers to execute arbitrary SQL commands via a double- encoded tag parameter.
|
|
|
|
Vulnerability: NetBSD NetBSD, OpenBSD OpenBSD Published: 2006-10-12 Severity: MEDIUM Description: Integer overflow in the systrace_preprepl function (STRIOCREPLACE) in systrace in OpenBSD 3.9 and NetBSD 3 allows local users to cause a denial of service (crash), gain privileges, or read arbitrary kernel memory via large numeric arguments to the systrace ioctl.
|
|
|
|
|
|
|
|
|
|
|
|