Multiple vulnerabilities have been discovered in Cisco VPN Routers

Multiple vulnerabilities have been discovered in Cisco VPN Routers

________________________________________________________________________ As a cloud consultancy firm specializing in cloud adoption and digital transformation, we want to make sure our customers have details on the latest threats and solutions.   Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers Remote Code Execution Vulnerabilities Technical Summary Multiple vulnerabilities in the web-based management interface of Cisco Small Business […]

Read More »
Multiple vulnerabilities have been discovered in Google Chrome

Multiple vulnerabilities have been discovered in Google Chrome

________________________________________________________________________ As a cloud consultancy firm specializing in cloud adoption and digital transformation, we want to make sure our customers have details on the latest threats and solutions.   Chrome Stable Channel Update for Desktop – February 2021 Technical Summary Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow […]

Read More »
Multiple vulnerabilities have been discovered in Google Android OS

Multiple vulnerabilities have been discovered in Google Android OS

________________________________________________________________________ As a cloud consultancy firm specializing in cloud adoption and digital transformation, we want to make sure our customers have details on the latest threats and solutions.   Android Security Bulletin—February 2021 Technical Summary Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution […]

Read More »
Amazon Elastic Kubernetes Service

Amazon Elastic Kubernetes Service

The most trusted way to run Kubernetes EKS runs upstream Kubernetes and is certified Kubernetes conformant so you can leverage all benefits of open source tooling from the community. You can also easily migrate any standard Kubernetes application to EKS without needing to refactor your code.   EKS is the best place to run Kubernetes […]

Read More »
What is Workspace Monitoring & Response (WMR)?

What is Workspace Monitoring & Response (WMR)?

Are you in charge of a large team needing constant direct, visual supervision? Having a remote workforce can bring about a myriad of different issues including productivity, engagement, and even regulatory compliance.  For a remote work environment to be successful, you and your team need constant direct visual supervision and collaboration. The best way to […]

Read More »
FBI Warns Ransomware Assault Threatens US Healthcare System

FBI Warns Ransomware Assault Threatens US Healthcare System

US government agencies have issued a joint security advisory following a series of ransomware attacks against hospitals across the country. The activity follows an increase in ransomware attacks throughout this year as well as recent surges of coronavirus in the United States. The FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of […]

Read More »