by Dutta | Jun 27, 2017 | Application Readiness
A vulnerable software program that isn’t patched compromises the security of the PC. This is because it leaves the PC vulnerable to being exploited by hackers. Vulnerabilities are discovered in software programs on a regular basis, and most vendors release a...
by Dutta | Jun 22, 2017 | Vulnerability Assessment, Vulnerability Management
Each year the Acunetix Team compiles a report based on data from Acunetix Online. This third Vulnerability Testing Report contains data and analysis of vulnerabilities detected by Acunetix throughout the period of March 2016 to March 2017, illustrating the state of...
by Dutta | Jun 20, 2017 | Virtualization
Why cloud computing – Cloud technologies are becoming one of the major investments for organizations to reduce costs; consolidate billing, availability, and disaster recovery; and enable BYOD and CYOD. Why are so many businesses moving to the cloud? Cloud computing...
by Dutta | Jun 13, 2017 | Data Leakage Prevention - DLP
We are excited to unveil the newest version of our Data Loss Prevention solution: Endpoint Protector 5, presenting important updates and a brand new redesigned interface. Our aim, as always, is to constantly enhance the data protection features, while offering an...
by Dutta | Jun 8, 2017 | Internet
IoT (Internet of Things) is a big word – it’s everywhere but not everyone knows what to do with it or where to place it: Isn’t it mostly SciFi technology? Doesn’t it have something to do with cars? Isn’t it just a fad that will soon go away? Isn’t that how the FBI and...