<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CUdefender &#187; security</title>
	<atom:link href="https://cudefender.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://cudefender.com</link>
	<description>Credit Union Cyber Security Solutions</description>
	<lastBuildDate>Tue, 24 Feb 2015 18:51:22 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.38</generator>
	<item>
		<title>Cyber Security Needs Board Level Visibility</title>
		<link>https://cudefender.com/cyber-security-needs-board-level-visibility/</link>
		<comments>https://cudefender.com/cyber-security-needs-board-level-visibility/#comments</comments>
		<pubDate>Tue, 13 Jan 2015 15:13:53 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[credit unions]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4284</guid>
		<description><![CDATA[<p>Recent research states that roughly two-thirds of companies say their executives get involved in security discussions, but for credit unions, it needs to be 100 percent of executives and, due to cyber threat risk, should extend beyond the executives directly to the board. Cyber attacks, like last November&#8217;s hack of Sony Pictures, have motivated many [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cyber-security-needs-board-level-visibility/">Cyber Security Needs Board Level Visibility</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Recent research states that roughly two-thirds of companies say their executives get involved in security discussions, but for credit unions, it needs to be 100 percent of executives and, due to cyber threat risk, should extend beyond the executives directly to the board.</p>
<p>Cyber attacks, like last November&#8217;s <a title="hack of Sony Pictures" href="http://www.itpro.co.uk/security/23593/sony-pictures-hack-the-interview-named-sonys-most-successful-online-release-ever" target="_blank">hack of Sony Pictures</a>, have motivated many to increase focus on external threats and begin having more discussions around real world cyber threats and overall preparedness.</p>
<p>Credit unions, like many other companies, have business units that submit regular requests to buy new cloud apps, the most popular being file-sharing services like Box, Dropbox, and Evernote. With most credit union infrastructure being built as fragmented layers of add-ons, over a period of many years, the security methods used to protect the legacy network and applications, as well as these new cloud applications, is severely lacking.</p>
<p>2015 is the year that credit unions must reinvent their security model to be more holistic and ready to face the sophistication of emerging threats. This doesn’t have to be a complete rip-out and replace initiative, and it can be accomplished much easier that most believe. Our team at <a title="CUdefender" href="http://www.cudefender.com/" target="_blank">CUdefender</a> speaks regularly with credit union executives and boards who don’t realize some of the quick and cost effective steps they can take to have an immediate positive impact on their security posture.</p>
<p>The long-standing issue of security having a proper seat at the executive table should no longer be a problem. Now it needs another lift upwards to the board. Hopefully credit unions will have foresight to make cyber topics a substantial part of their 2015 board and strategic planning meetings.</p>
<p>Credit unions looking for security planning assistance or cyber threat protection can contact CUdefender at 1-888-632-4339 or visit <a href="http://www.cudefender.com/" target="_blank">http://www.cudefender.com</a> for additional information.</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cyber-security-needs-board-level-visibility/">Cyber Security Needs Board Level Visibility</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/cyber-security-needs-board-level-visibility/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CUdefender Protects Credit Unions Against &#8220;Shellshock&#8221; Vulnerability</title>
		<link>https://cudefender.com/cudefender-protects-against-shellshock-vulnerability/</link>
		<comments>https://cudefender.com/cudefender-protects-against-shellshock-vulnerability/#comments</comments>
		<pubDate>Fri, 26 Sep 2014 01:27:08 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4093</guid>
		<description><![CDATA[<p>Yesterday, a security researcher released the details of a major security vulnerability in Bash, a.k.a. Bourne-Again Shell, a popular software utility. The vulnerability, known as Shellshock, will be a serious problem for many Linux, Unix, and Mac OS X users. In order to protect our Credit Union customers from being affected by Shellshock, CUdefender has proactively [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cudefender-protects-against-shellshock-vulnerability/">CUdefender Protects Credit Unions Against &#8220;Shellshock&#8221; Vulnerability</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Yesterday, a <a title="security researcher" href="http://stephane.chazelas.free.fr/">security researcher</a> released the details of a major security vulnerability in Bash, a.k.a. Bourne-Again Shell, a popular software utility.</p>
<p>The vulnerability, known as Shellshock, will be a serious problem for many Linux, Unix, and Mac OS X users.</p>
<p>In order to protect our Credit Union customers from being affected by Shellshock, CUdefender has proactively updated its Web Application Firewall (WAF) rules to block the vulnerability.</p>
<p>Our implemented security rules work in multiple stages to ensure that Shellshock cannot be exploited on systems protected by CUdefenders’s WAF.</p>
<p>As a best practice, administrators of any systems running Bash should patch their systems as soon as patches for their distributions are available, even if those systems are already protected by CUdefender. Mjor Linux distributions such as Redhat, have already released patches.</p>
<p>Some vendors and third parties have already gone as far as creating simple diagnostic tools which can be run after patching to make sure that the vulnerability is closed and unexploitable on your system.</p>
<p>Technical details for Shellshock and affected versions for this vulnerability can be found in the National Vulnerability Database using the ID #’s <a title="CVE-2014-6271" href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271">CVE-2014-6271</a> and <a title="CVE-2014-7169" href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169">CVE-2014-7169</a>.</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cudefender-protects-against-shellshock-vulnerability/">CUdefender Protects Credit Unions Against &#8220;Shellshock&#8221; Vulnerability</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/cudefender-protects-against-shellshock-vulnerability/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Dynamic page generated in 0.560 seconds. -->
<!-- Cached page generated by WP-Super-Cache on 2025-12-14 05:48:14 -->
