by Dutta | Nov 27, 2018 | Corporate Software Inspector, Patch Management, Software License Optimization, Software Updater, Software Vulnerability Management, Vulnerability Assessment, Vulnerability Management
I recently read over Flexera’s Vulnerability Review 2018: Top Desktop Apps report, and frankly, I’m not surprised by the findings. According to the research, 83% of vulnerabilities were rated extremely or highly critical. Also, a staggering 93% of those...
by Dutta | Nov 25, 2018 | Security, Vulnerability Assessment, Vulnerability Management, Web Application Security, Web Security, Web Vulnerability Scanner
There are literally hundreds of ways to secure & solidify a Nginx server after an attack. But, what does it REALLY need to be cleaned and secure? What are the essential changes you have to make to feel secure again? To answer that question, we’ll have to...
by Dutta | Nov 22, 2018 | Encryption, Network Monitoring, Network Traffic Analysis, Reporting, Secure File Transfer, Security, Traffic Analysis
It’s a given that users with access to your MFT solution have permission to use it and know exactly what they are allowed to do with it. But maybe it shouldn’t be. Security policies change regularly due to internal organizational evolution as well as new external...
by Dutta | Nov 19, 2018 | Access Control, Content Aware Protection, Cyber security, Data Leakage Prevention - DLP, Data Security, Device Control, Discovery, Easy Lock, Encryption, Endpoint Security, Mobile Device Management
When developing new software and algorithms, companies’ number one concern is that they do the job they are meant to do and function efficiently. Cybersecurity features, when implemented, are meant to ensure the protection of users’ data and guard against malicious...
by Dutta | Nov 15, 2018 | Bomgar Discovery Tool, Cyber security, Password Vault, Privileged Access Management, Privileged Identity Management, Remote Support
Today we live in a world where cyberattacks are commonplace. DDoS exploits take down web sites we rely on. Spear-phishing attacks trick us into revealing personal information. And data breaches compromise our credit cards stored in retailers’ databases. Everyone, it...