SECURITY INSIGHT BLOG

Welcome to emt technology blog.

What is Black-box Security Testing?

Black-box security testing refers to a method of software security testing in which the security controls, defences and design of an application are tested from the outside-in, with little or no prior knowledge of the application’s internal workings. Essentially,...

read more

Beta Test: New user interface for Antivirus (Windows)

We are currently developing a new User Interface for the Avira Antivirus for Windows and we are thrilled to show it to you! It has a modern, fresh look which fits the overall Avira design. This easy to use interface simplifies and reduces the number of interactions...

read more

Issue Tracker Integration with Acunetix

Issue trackers such as Atlassian JIRA, GitHub and Microsoft TFS powerful and essential tools in the Software Development Life Cycle (SDLC) of almost any software project. They help development teams streamline collaboration and manage their work without getting lost...

read more

What’s NEW in Parallels RAS v16

Parallels RAS v16 – Version 16 of Parallels® Remote Application Server (RAS) continues to offer the best value among application and desktop delivery solutions, with several improvements that affect the performance and ease of use of the software. These...

read more

Windows 10 Upgrade: Advantages of Cloud Computing

Windows 10 upgrade – When a new version of Windows is released, everyone gets excited and may forget to consider if critical applications will continue to work. Back in the day, IT had control over when and how applications and operating systems were deployed,...

read more

Major Update of Acunetix Online out now!

Acunetix Online has undergone a mammoth update, now enjoying all the features and benefits found in Acunetix On Premise, including: Integrated vulnerability management, greater manageability of threats and targets and the integration of popular WAFs and Issue Tracking...

read more

Is Your Data at Rest Safe?

With recent surges in hacker attacks and leaks, it seems that sensitive data has never been more vulnerable. And with every aspect of businesses becoming digitized, we are increasingly relying on third party solutions, whether antivirus, Data Loss Prevention,...

read more

Petya strikes back

This time, it’s not just EternalBlue. Petya is back – and this time it’s not just targeting the people with out-of-date software. The list of notable victims already includes Maersk shipping giant, the Chernobyl radiation detection systems, and more. This particular...

read more

Why are so many Businesses moving to the Cloud?

Why cloud computing – Cloud technologies are becoming one of the major investments for organizations to reduce costs; consolidate billing, availability, and disaster recovery; and enable BYOD and CYOD. Why are so many businesses moving to the cloud? Cloud computing...

read more