Ordr Response to Log4j Vulnerability
Read Article
Read Article
Jamison Utter, Dir Product/Solutions walks through how to detect and respond to PrintNightmare on the Ordr platform
Watch Video
In this blog post, Srinivas Loke shares best practices for using your Ordr deployment to track a potential DarkSide ransomware infection within your organization.
Read Article
Watch the Protecting Medical Devices from Cyber Attacks webinar to learn how to achieve real-time asset visibility of all connected devices, identify and respond to vulnerabilities and more.
Watch Video
NAME:WRECK is a collection of nine DNS based vulnerabilities found in commonly used TCP/IP stacks which are utilized by potentially millions of IoT devices - here is what you should know.
Read Article
Watch this webinar to learn how to identify IoT/IoMT device risk, risk mitigation best practices, and how ransomware is targeting healthcare.
Watch Video
While many security vendors are claiming that they could have detected the breach, we are not and are just sharing our response and learnings.
Read Article
Ordr will be able to detect the effected HAFNIUM devices and will alert the proper workflow based on the associated the CVEs that have been issued.
Read Article
Learn how a STIX/TAXII and Ordr SCE integration benefits your organization by discovering and identifying unique threats and increasing the value of your existing investments.
Read Flipbook
Read how Ordr has done extensive work to not only help identify devices impacted by the Ripple20 vulnerabilities but also detect any active exploitations happening.
Read Article
Ordr has the capability to detect and classify all systems on the network, thus we are able to detect any SolarWinds systems that exist at any time on the network. See how we can help.
Read Article
Vulnerability Management is a critical and challenging aspect of security. Read the white paper to learn how Ordr solves these challenges.
Read Flipbook
This security bulletin shows how you can detect, defend, and respond to Ryuk Ransomware using Ordr.
Read Flipbook
Ordr's recommendations for defense against ransomware as a service (RaaS) in regards to the CISA Alert (AA20-302A) - Ransomware Activity Targeting the Healthcare and Public Health Sector.
Read Article
Hear from Ordr CISO Jeff Horne for a quick overview of the top ransomware campaigns and TTPs targeting healthcare organizations, and best practices to protect against ransomware.
Watch Video
Any threat to the TCP/IP stack impacts the fundamental networking core of a device. Using Ordr SCE, organizations can detect and mitigate risks from Ripple20.
Read Article
In this blog post, Jeff Horne, CSO, Ordr, will cover Ransomware in Healthcare Providers and Healthcare Delivery Organizations, the Tactics, Techniques, Procedures and Recommendations of How to Triage.
Read Article
Ransomware is one of the more insidious attacks that can be unleashed by malicious actors, and healthcare and hospitals are particularly vulnerable. Learn what to do when a ransomware attack happens.
Read Article
Cisco announced that its Aironet Access Points and Catalyst 9100 Access Points are vulnerable to a Denial of Service attack. Read the security bulletin now.
Read Flipbook
Ordr Systems Control Engine (SCE) can detect URGENT/11 cyberattacks and protect devices from vulnerabilities. Read the security bulletin now.
Read Flipbook
Loading More...