SECURITY INSIGHT BLOG

Welcome to emt technology blog.
Flexera Adds Big Automation Boost to Open Source Software Scanning, Compliance and Protection

Flexera Adds Big Automation Boost to Open Source Software Scanning, Compliance and Protection

FlexNet Code Insight 2018 Creates Automated Bill of Materials, Adding New Level of Trust and Transparency into Software Supply Chain   Flexera is further simplifying open source software (OSS) license compliance and vulnerability protection.  FlexNet Code Insight 2018...

read more

Flexera Adds Big Automation Boost to Open Source Software Scanning, Compliance and Protection

FlexNet Code Insight 2018 Creates Automated Bill of Materials, Adding New Level of Trust and Transparency into Software Supply Chain   Flexera is further simplifying open source software (OSS) license compliance and vulnerability protection.  FlexNet Code Insight 2018...

read more

New build introduces HTTP Responses in Alerts, adds manual intervention, vulnerability checks in Cisco ASA, Apache Tomcat

Acunetix v12 (build 12.0.180725167) has been released. This new build adds detection for vulnerabilities in Cisco ASA, Apache Tomcat, Altassian Jira, Spring, JBoss and misconfigured nginx installations. The new build also includes HTTP Responses in the vulnerability...

read more

Counting The Real Cost Of A DIY Network Monitoring Solution

It can be tempting to build your own DIY Network Monitoring solution, but what's the real cost of building and maintaining such a tool at scale? For many start-up IT services organizations, Managed Services Providers (MSPs), and even in-house IT departments, it can be...

read more

5 Tips for Choosing the Best DLP solution for Macs

macOS devices are becoming an ever more prominent presence in the work place. This is chiefly due to two trends: bring your own device (BYOD) and employee choice policies. The first allows employees to bring their own devices onto the company network, while the second...

read more

Discover Your Privileged Account Security Vulnerabilities

With the advanced capabilities of today’s cyberattacks, If an intruder is determined to break into your network, he will. It doesn’t matter how many perimeter defenses you build around your IT environment. One of the most common ways cybercriminals get into systems is...

read more

How to ensure protection for your smart devices

Ask a lot of people are they concerned that smart devices are transmitting data back to the manufacturer and many will shrug their shoulders and mutter, ‘Who cares?’ This is probably because they don’t know the type of data that is being culled. For instance does a...

read more

InstallShield Suite Updates – Get Your Customers on the Latest Version

Every software supplier knows that it’s not always easy to move customers to the latest and greatest version of a software product. Some take months, some even years to upgrade – which means that they cannot leverage the latest features and you, as a supplier, have...

read more

Top Desktop Apps edition of Vulnerability Review 2018 is now available!

Flexera releases Vulnerability Review 2018 – Global Trends, with data on vulnerabilities and security patches for the top Windows desktop applications. The data is the result of the continuous analysis of vulnerabilities by Secunia Research at Flexera. The report...

read more

New build detects an unfixed WordPress file deletion vulnerability, vulnerabilities in WordPress plugins and Joomla! Core

Acunetix v12 (build 12.0.180628131) has been released. This new build detects an unfixed WordPress file deletion vulnerability, vulnerabilities in multiple WordPress Plugins and two Joomla! Core vulnerabilities. Below is a full list of updates. New Features and...

read more