Wednesday, August 21, 2019

New vulnerabilities discovered in Windows

 
End-User Computing Digest
The latest desktop and mobile coverage from TechTarget's network |Aug. 21, 2019
TechTarget
FEATURED STORY

New Windows vulnerabilities reveal there is no rest for weary IT

by Jesse Scardina, News Writer
Two Windows vulnerabilities were discovered this past week. One vulnerability dates back 20 years and the other exposes Windows machines to a 'wormable' attack, which could spread malware from computer to computer without user interaction. (SearchEnterpriseDesktop.com)
Advertisement
NEWS
 
Samsung-Microsoft partnership will benefit end users

A new Samsung-Microsoft partnership that was announced at Samsung's annual Unpacked event can potentially bridge the gap between PCs and smartphones in the enterprise, according to analysts. (SearchMobileComputing.com)

 
Customers can interact with new VMware DaaS product at VMworld

At its annual user conference next week, VMware will introduce Managed Desktops, a DaaS product built on VMware Cloud on AWS, providing another option in the growing desktop-as-a-service market. (SearchVirtualDesktop.com)

EXPERT ADVICE
 
Which options does IT have for Windows 10 bloatware removal?
Bloatware can be harmful to a Windows 10 OS. Learn about options for Windows 10 bloatware removal, such as with a PowerShell script or image-based deployment. (SearchEnterpriseDesktop.com)
 
Best practices to prevent RDP security issues
RDP security issues are surprisingly common. Implement these best practices to avoid attacks in your organization and learn about the latest RDP vulnerability, BlueKeep. (SearchVirtualDesktop.com)
 
Enterprise mobility management software offerings and use cases

Enterprise mobility management products allow IT to control mobile users' devices and applications, and there's a lot that IT should know about these offerings. (SearchMobileComputing.com)

 
7 questions to ensure UEM supports a Windows 10 migration
A Windows 10 migration is a massive undertaking. Ask these seven questions to ensure your organization has the right unified endpoint management tools to support the process.  (SearchEnterpriseDesktop.com)
About This E-Newsletter
The End-User Computing Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: