THE ORIGINA BLOG

National Vulnerability Database Backlog Highlights Need for Proactive Security Measures

National Vulnerability Database Backlog Highlights Need for Proactive Security Measures

The U.S. National Vulnerability Database backlog underscores the increasing need for individual companies (and the organizations that support them) to monitor cybersecurity vulnerabilities and take proactive mitigation measures.

read more
Shielding Your Systems from Software Security Vulnerabilities

Shielding Your Systems from Software Security Vulnerabilities

In our March Security Update, we explore the recent rash of cyberattacks to telecoms, share updates on the latest CVEs, and discuss how we fixed over 140 software security vulnerabilities for only one company.

read more
Enhancing Your Software Security Resilience

Enhancing Your Software Security Resilience

This month’s Origina Security Services blog shares information on building up cyber resilience within your organization, the latest security vulnerabilities, and an update from the U.K. National Cyber Security Centre’s 2024 annual review.

read more
Proactive Software Security Strategies Reduce IT Risk

Proactive Software Security Strategies Reduce IT Risk

Proactively securing your software goes beyond patching. By understanding risks and implementing a layered defense, you can stay ahead of threats, protect your IT estate, and reduce costly vulnerabilities. Discover strategies to strengthen your cybersecurity posture.

read more
What Does Effective Cyber Threat Intelligence Look Like? Experts Weigh In

What Does Effective Cyber Threat Intelligence Look Like? Experts Weigh In

What is cyber threat intelligence and how can it elevate your total approach to security? Two experts share their advice.

read more
CrowdStrike Chaos Underscores Serious Downsides of Automatic Software Updates

CrowdStrike Chaos Underscores Serious Downsides of Automatic Software Updates

The CrowdStrike outage illustrates a serious downside to automatic software updates. Get your software update policies and practices in check before the next major issue occurs.

read more
Security Alert: Polyfill.io Supply Chain Attack

Security Alert: Polyfill.io Supply Chain Attack

Affected by the JavaScript Polyfill.io cyberattack? Here's how to mitigate the situation before threat actors redirect your website visitors to scam sites to steal their info.

read more
Exploiting VMware: Examining the MITRE NERVE Cyberattack and its Business Takeaways

Exploiting VMware: Examining the MITRE NERVE Cyberattack and its Business Takeaways

If cybercriminals can breach a MITRE network, is there any system they can’t reach? Read more about this cyberattack and what we recommend to prevent a similar incident from happening to you.

read more
New Features Enhance Cybersecurity Vulnerability Advisory Portal 2.0

New Features Enhance Cybersecurity Vulnerability Advisory Portal 2.0

Cybersecurity is the number one risk to all industries. Read how the newest enhancements to Origina’s Vulnerability Advisory Portal 2.0 can help you in the battle against cyberthreats.

read more
Removing the Fear of Cybersecurity Risk: Origina’s Vulnerability Advisory Portal 2.0

Removing the Fear of Cybersecurity Risk: Origina’s Vulnerability Advisory Portal 2.0

Origina’s latest Vulnerability Portal 2.0 provides the information you need to keep your digital assets secure.

read more
CVE-2023-44487: IBM Vulnerability Warning for HTTP/2 Rapid Reset Attack

CVE-2023-44487: IBM Vulnerability Warning for HTTP/2 Rapid Reset Attack

The CVE-2023-44487 security vulnerability can cause Denial of Service on systems using HTTP/2 if exploited. Read more about this latest cyberattack.

read more
Examining the Risks of Running Unsupported Software

Examining the Risks of Running Unsupported Software

The legacy software in your estate has a lot of life left to give if you take steps to secure it. And there are almost always steps you can take to harden the estate.

read more