Resources

Security and Compliance

November 2024 Third-Party Patches: Notable Vulnerabilities and Updates 
Recast Blog

November 2024 Third-Party Patches: Notable Vulnerabilities and Updates 

October 2024 Patch Tuesday: Critical Security Updates
Recast Blog

October 2024 Patch Tuesday: Critical Security Updates

September 2024 Patch Tuesday: Critical Security Updates
Recast Blog

September 2024 Patch Tuesday: Critical Security Updates

Patch Tuesday August 2024: Critical Vulnerability Roundup 
Recast Blog

Patch Tuesday August 2024: Critical Vulnerability Roundup 

5 Key Strategies for Small Business Disaster Recovery
Recast Blog

5 Key Strategies for Small Business Disaster Recovery

Automated Third-Party Patching Controls: Lessons from the CrowdStrike Incident
Recast Blog

Automated Third-Party Patching Controls: Lessons from the CrowdStrike Incident

Patch Tuesday July 2024: Critical Vulnerability Roundup 
Recast Blog

Patch Tuesday July 2024: Critical Vulnerability Roundup 

Patch Tuesday June 2024: Critical Vulnerability Roundup 
Recast Blog

Patch Tuesday June 2024: Critical Vulnerability Roundup 

Patch Tuesday May 2024: Critical Vulnerability Roundup 
Recast Blog

Patch Tuesday May 2024: Critical Vulnerability Roundup 

Ivanti Workspace Control End of Life: Discover Your Next Steps with Application Workspace
Recast Blog

Ivanti Workspace Control End of Life: Discover Your Next Steps with Application Workspace

Streamlining IT Management: The Advantages of Consolidating with Recast Software 
Recast Blog

Streamlining IT Management: The Advantages of Consolidating with Recast Software 

How to Create a Recast Agent Deployment Process in Application Manager
Recast Blog

How to Create a Recast Agent Deployment Process in Application Manager

Optimizing Application Management for Windows and macOS 
Recast Blog

Optimizing Application Management for Windows and macOS 

Rapid Application Patching with Application Manager 
Recast Blog

Rapid Application Patching with Application Manager 

Cybersecurity Insurance and Risk Management: Key Insights for IT Leadership 
Recast Blog

Cybersecurity Insurance and Risk Management: Key Insights for IT Leadership 

Inside Recast Software: SOC 2 Security Report and ISO 27001 Certification 
Recast Blog

Inside Recast Software: SOC 2 Security Report and ISO 27001 Certification 

Rapid Software Patching Required: A Strategic Guide for IT Directors and CISOs
Recast Blog

Rapid Software Patching Required: A Strategic Guide for IT Directors and CISOs

Stories from the Street: How One Software Vulnerability Multiplied
Recast Blog

Stories from the Street: How One Software Vulnerability Multiplied

IT Security in the Hybrid Work Era: Top Insights from Recast’s Security Webinar 
Recast Blog

IT Security in the Hybrid Work Era: Top Insights from Recast’s Security Webinar 

Harden Now or Pay Later: Cybersecurity Insurance Policy Exclusions
Recast Blog

Harden Now or Pay Later: Cybersecurity Insurance Policy Exclusions

Enhancing Cybersecurity: Meeting the ACSC Essential Eight Standards 
Recast Blog

Enhancing Cybersecurity: Meeting the ACSC Essential Eight Standards 

Zero Trust and the Principle of Least Privilege
Recast Blog

Zero Trust and the Principle of Least Privilege

We recently covered Zero Trust principles broadly. Now let's talk more about how Privilege Manager contributes to certain areas of Zero Trust, including the principle of least privilege.

Why Third-Party Application Patching Needs to be Automatic 
Recast Blog

Why Third-Party Application Patching Needs to be Automatic 

Kaspersky Labs identified software vulnerabilities as the leading cause of breaches in 2021, outpacing phishing for the first time ever. This data means that organizations need to add third-party patching to their cybersecurity position. If you aren’t patching third-party applications, it is important to get started now.  

Principle of Least Privilege: The #1 Protection Against Security Threats in Windows 
Recast Blog

Principle of Least Privilege: The #1 Protection Against Security Threats in Windows 

By Sami Laiho, Chief Research Officer at Truesec and Microsoft MVP in Windows and Devices for IT. Has applied the principle of least privilege in environments for over 20 years.

Removing Admin Rights Hardens your Environment
Recast Blog

Removing Admin Rights Hardens your Environment

The User Manual for NT 3.1, published almost 30 years ago in 1993, explains that the security subsystem of the NT operating system is not built to withstand the use of local admin rights. Admins typically set settings and limited users can’t change them. When it comes to configuration, it’s supposed to work ...

2 Core Rules of Zero Trust with Sami Laiho 
Recast Blog

2 Core Rules of Zero Trust with Sami Laiho 

Sami Laiho, a Microsoft MVP in Windows OS and a highly regarded security expert, recently collaborated with Recast Software to host a webinar, “Zero Trust with Sami Laiho.” Sami concisely made his case for Windows security in 2022.