How to Take Action on Spectre & Meltdown
How to Take Action on Spectre & Meltdown

Headlines are calling Spectre and Meltdown the cyber-security story of the decade. But what does it actually mean for your organization? How have others dealt with this?

Spectre and Meltdown are the names given to a hardware vulnerability affecting almost every computer chip manufactured in the past 20 years. Although an exploit has yet to be created for these vulnerabilities, it’s likely only a matter of time. After all, the 2015 Verizon Data Breach Investigations Report found that nearly three quarters of cyber attacks exploit patchable vulnerabilities.

New vulnerabilities are being found all the time and patches are not always a one-time fix it and forget it. With Spectre and Meltdown, for example, a series of patches have come out from Intel, Microsoft and others to address first the security vulnerability and second, machine and patch performance. How do you ensure critical patches are deployed to endpoints to secure data and endpoints from risk?

Spectre & Meltdown: Assess the Risk and Protect Your Devices

With a variety of patches required to address Spectre and Meltdown, and further patches expected, staying on top of patch deployment can be difficult to manage in the absence of automated risk assessment and patch remediation.

In an upcoming webinar, Jason Short, Senior Director of Product Management at Absolute, will address the impact of Meltdown and Spectre on the millions of endpoint devices affected across the globe and provide valuable insight on how leading organizations are rapidly responding with Absolute Reach. The webinar will include:

  • Examples of automated workflows to assess and remediate security vulnerabilities
  • How to use assessment workflows to test chips for vulnerability, regardless of patch deployments
  • How to secure data and endpoints for off-network devices
  • How you can leverage Absolute Reach within your own environment

WEBINAR CTA absolute

Spectre and Meltdown are only the most recent vulnerability in a constantly shifting risk landscape. The most important question for any organization is: will you be able to identify vulnerabilities like these in the future and take action before your data is compromised? These events happen fast – you have a short window to act. Register for the webinar today to learn how to leverage Absolute Reach to rapidly assess and remediate your devices.

ABOUT THE AUTHOR

Kim Ellery

Kim Ellery serves as a Senior Director of Product Marketing at Absolute. In this role, Kim drives the development and direction of Absolute’s go-to-market strategy, including facilitating product and market intelligence while engaging with Absolute staff, customers and partners. Prior to Absolute, Kim served in product management and marketing roles at Mobile Mentor within Asia-Pacific and Europe, where he developed and implemented effective mobile security solutions. Kim is also involved with a number of entrepreneurial ventures in the local tech community, and a mentor to aspiring product marketers at Product BC.