
SECURITY INSIGHT BLOG
Welcome to emt technology blog.
Protecting backups with PAM
Backups need protection Backups are a good thing. Obviously! But they're important for much more than restoring a file deleted accidentally. When ransomware attacks, it sets out to cause as much disruption as possible. Often, the only escape (other than paying the...
Protecting backups with PAM
Backups need protection Backups are a good thing. Obviously! But they're important for much more than restoring a file deleted accidentally. When ransomware attacks, it sets out to cause as much disruption as possible. Often, the only escape (other than paying the...
emt Distribution has signed the Partnership with Hornetsecurity for APAC and META to strengthen the MSP & Cloud division offerings.
Same mission: Offering the best possible managed security services for the IT channel “Hornetsecurity is impressed by emt’s experience, network and strategic direction. We are very pleased to have found the perfect partner in this award-winning distributor so that we...
Acunetix Stance on the SolarWinds Hack
We at Acunetix and Invicti are deeply concerned with the aftermath of the SolarWinds hack and offer our deepest commiserations to all the security personnel who are facing this situation just before Christmas, and to SolarWinds themselves who have been an...
MFT As A Dropbox Alternative For Business File Transfer
A countless amount of data is being processed through the internet every single day (and every hour, minute, second, millisecond) of that day. And, given our current climate, sharing files over the internet is more important than ever. You're probably sharing jpegs,...
Protecting Critical Infrastructure from Advanced Cyberattacks
The frequency and severity of targeted cyberattacks from organizations around the world continue to increase. The latest example is the SolarWinds hack which targeted multiple government and private organizations. While experts are still analyzing the root cause and...
7 technologies to help your business with GDPR compliance
In today’s global economy, businesses must be compliant with standards established by various countries so they can service customers around the world. One such regulation you can’t afford to ignore is the GDPR (General Data Protection Regulation), which is the core...
How DLP Helps Media Companies
The advent of global online streaming services such as Netflix and Amazon Prime have boosted media productions across the world. Original content is being created for the platforms not only in the US, but in places as wide apart as Japan, Nigeria, and Colombia. This...
Imagine If DevOps Environments Could Be Easily Automated
Common DevOps Challenges A common activity for many developers is to quickly spin-up or refresh their dev or test environments as they're developing new features on investigating production issues. If you're someone that's familiar with tools like Vagrant and Ansible,...
7 Reasons Why DAST Is the Multitool of Web Application Testing
DAST is fast becoming an indispensable part of any web application security toolkit. The versatility of modern dynamic tools brings advantages that extend far beyond typical vulnerability scanning scenarios. Let’s take a look at 7 things that make DAST the multitool...
Ways To Ensure Data Protection And Secure File Sharing Of Personal Data
In today's age of the Internet, our personal data are stored on various servers, and they are continuously moving around. We need to realize how are the data handled, why it is like that, and how the process for data protection can be improved. Is there...
Macs in the enterprise: macOS now on AWS
In an exciting turn of events for Apple developers, Amazon has announced that, for the first time, macOS will be available on its Amazon Web Services (AWS) cloud. As of 30th November 2020, Amazon Elastic Compute Cloud (EC2) Mac instances for macOS can be...
MetaDefender Email Gateway Security v5.2.0
Product Overview The September release of MetaDefender Email Gateway Security added several advanced gateway-technologies, enabling the solution to provide up to 99% protection against malware. The current release includes new capabilities to simplify IT...
Don’t get scammed online this holiday season
There is something like two billion people across the globe that regularly shop online today. That's roughly about one in four of the world's population. During the Christmas holiday season, online shopping surges to an annual peak and it's probably higher than ever...
ESET’s cloud-first protection secures the shift to remote working
Cloudification, or the process of moving applications and services from local machines to those accessed over the internet, has long been a top priority for many businesses. By migrating resources to the cloud, they are made accessible from any location, which...
5 Reasons Why Web Security Is as Important as Endpoint Security
Would you say that your company is secure if your employees are using laptops with no anti-malware installed at all? Most businesses would say that is an irresponsible approach. Then why would many businesses have websites and web applications with no protection at...
How ITAM can close the door on asset vulnerabilities
Software either is or will be vulnerable. It’s rare that you won’t have to update out-of-date, unsupported or end-of-life software. If your job description involves software or IT asset management (SAM/ITAM), this is part of your day-to-day and nothing...
MetaDefender Core v4.19.2 Release
Product Overview OPSWAT MetaDefender Core protects your organization by preventing advanced cybersecurity threats on multiple data channels. MetaDefender Core leverages a number of technologies, including Deep Content Disarm and Reconstruction (Deep...
3 Reasons Why DAST Is the Best Way to Begin the Web Application Security Journey
To fully secure your web applications, you need several software solutions, specialist internal resources, and external contractors. However, this means significant costs and not everyone can afford it all at once. How should small businesses start their web...