Systems Engineering

Recent Posts

Systems Engineering Announces Security Operations Partnership with Arctic Wolf

September 08, 2022

Systems Engineering SE EventWatch Powered by the Arctic Wolf Security Operations Cloud Now Provides Clients Industry-Leading Cybersecurity Capabilities to Tackle the Increasing Dangers of Advanced Cyberattacks.

Read More »


SECURITY ALERT: VMware Tools local privilege escalation vulnerability

August 26, 2022

On Tuesday, August 23, an advisory notification was released by VMware, the virtualization technology software firm, announcing a local privilege escalation vulnerability (CVE-2022-31676). Updates are available to remediate this vulnerability in affected VMware products.

Read More »

Security Bulletins & Alerts

8 Reasons to Conduct a Cybersecurity Risk Assessment

July 14, 2022

The rate of technology change is accelerating, along with the number of attack surfaces within a company environment. At no time was the acceleration more evident than during the height of the pandemic. Many companies had to adapt and invest in technology to simply keep operating.

Read More »


SECURITY BULLETIN: Mitel MiConnect VOIP Zero-Day Vulnerability

June 28, 2022

Several cybersecurity research groups have identified and studied the use of a Zero-Day vulnerability found in the Mitel VoIP MiConnect solution, CVE-2022-29499. The vulnerability exists due to improper input validation in the Mitel Service Appliance. A cyberattacker can send a specially crafted HTTP GET request to the application and execute arbitrary Operating System commands on the target system. Successful exploitation of this flaw may result in the complete compromise of the vulnerable system. This vulnerability has been successfully exploited by at least one ransomware group.

Read More »

Security Bulletins & Alerts

Data Breach: 5 Critical Questions Answered

June 13, 2022

Since 2008, Verizon has released its annual Data Breach Investigations Report (DBIR). This is a data-driven report on threats your organization may encounter in regard to cybercrime. The threats identified are the most common tactics used against organizations that resulted in a data breach.

Read More »


5 Qualities of a Reliable Cloud Migration Service Partner

May 05, 2022

Have you decided to relocate some or all of your organization's infrastructure to a cloud services provider (CSP) such as Microsoft, Google, or Amazon? If so, the next step is to consider who will serve as your cloud migration service partner. The right consultant can get you to the cloud securely and cost-effectively while enhancing performance. But ... not all cloud migration service partners are created equal.

Read More »

Business Transformation, IT Solutions & Support

3 Practical Tips for Creating Strong Passwords

April 08, 2022

Recent world events involving domestic cyberthreats and debilitating ransomware attacks on critical U.S. infrastructure have prompted private corporations and the government alike to place a renewed urgency on cybersecurity and network defense measures.

Read More »

Network Security