by Varsha K | Jan 14, 2021 | Backups, Cyber security, Privileged Access Management, Privileged Access Security, Privileged Endpoint Management, Privileged Identity Management, Privileged Process Automation
Backups need protection Backups are a good thing. Obviously! But they’re important for much more than restoring a file deleted accidentally. When ransomware attacks, it sets out to cause as much disruption as possible. Often, the only escape (other than paying...
by Varsha K | Jan 6, 2021 | Acunetix, Cyber security, Data Security, Fastest Web Scanning Engine, Web Application Security, Web Security, Web Vulnerability Scanner
We at Acunetix and Invicti are deeply concerned with the aftermath of the SolarWinds hack and offer our deepest commiserations to all the security personnel who are facing this situation just before Christmas, and to SolarWinds themselves who have been an...
by Varsha K | Jan 5, 2021 | Cyber security, Data Security, Managed File Transfer, MFT Solution, Secure File Transfer, Secure Folder Sharing, Security
A countless amount of data is being processed through the internet every single day (and every hour, minute, second, millisecond) of that day. And, given our current climate, sharing files over the internet is more important than ever. You’re probably sharing...
by Varsha K | Jan 3, 2021 | Compliance and Regulations, Cyber security, Data Classification, Data Identification, Data Protection, Data Security, Regulatory Compliance
In today’s global economy, businesses must be compliant with standards established by various countries so they can service customers around the world. One such regulation you can’t afford to ignore is the GDPR (General Data Protection Regulation), which is the core...
by Varsha K | Dec 30, 2020 | Cyber security, Data Leakage Prevention - DLP, Data Loss Prevention, Data Security, Endpoint Protector Enterprise, Endpoint Security
The advent of global online streaming services such as Netflix and Amazon Prime have boosted media productions across the world. Original content is being created for the platforms not only in the US, but in places as wide apart as Japan, Nigeria, and Colombia. This...
by Varsha K | Dec 28, 2020 | Cyber security, Data Security, Privileged Access Management, Privileged Access Security, Privileged Endpoint Management, Privileged Identity Management, Privileged Process Automation
Common DevOps Challenges A common activity for many developers is to quickly spin-up or refresh their dev or test environments as they’re developing new features on investigating production issues. If you’re someone that’s familiar with tools like...