SECURITY INSIGHT BLOG

Welcome to emt technology blog.
What is Remote File Inclusion (RFI)?

What is Remote File Inclusion (RFI)?

Using remote file inclusion (RFI), an attacker can cause the web application to include a remote file. This is possible for web applications that dynamically include external files or scripts. Potential web security consequences of a successful RFI attack range from...

read more
What is Remote File Inclusion (RFI)?

What is Remote File Inclusion (RFI)?

Using remote file inclusion (RFI), an attacker can cause the web application to include a remote file. This is possible for web applications that dynamically include external files or scripts. Potential web security consequences of a successful RFI attack range from...

read more
Facebook and GDPR: The Importance of Data Privacy

Facebook and GDPR: The Importance of Data Privacy

When the word “hacking” is mentioned in a conversation, people generally have the same image pop into their heads: a glasses-adorned hacker types furiously in front of several computer monitors while analyzing massive amounts of code to steal millions of dollars. He...

read more
What’s New in Endpoint Protector 5.2.0.8

What’s New in Endpoint Protector 5.2.0.8

We’re eager to announce that the new version of our award-winning Data Loss Prevention (DLP) solution has been released. Endpoint Protector 5.2.0.8 is out with the aim of offering enhanced data protection options during these challenging times. The COVID-19 pandemic...

read more
Top cybersecurity tips for start-ups businesses – and a great free offer

Top cybersecurity tips for start-ups businesses – and a great free offer

Cybersecurity at start-up businesses is one of those things that can be on the periphery. For sure, it’s important and it’s needed but for many business owners the main priority is to get the business up and running and then add in some basic security measures before...

read more
4 HORRIBLE MISTAKES YOU’RE MAKING WITH IT ASSET MANAGEMENT

4 HORRIBLE MISTAKES YOU’RE MAKING WITH IT ASSET MANAGEMENT

A good IT asset manager is great at demonstrating the value the IT department provides to the organization as a whole. Effective IT asset management (ITAM) enables the IT department to make smarter decisions by optimizing equipment and creating positive forward...

read more
How to analyze Flow Data with StableNet®

How to analyze Flow Data with StableNet®

Flow data can be one of the best tools a network engineer can use to track down issues. Flow data can be used for a variety of troubleshooting tasks, including: Network performanceCapacity planningSecurity audits… and more The key to understanding how to analyze flow...

read more
How to Convert a Selenium Login Script into a Login Sequence File

How to Convert a Selenium Login Script into a Login Sequence File

Selenium is a tool that allows you to automate browser actions. It is often used by QA engineers to automatically and efficiently test the functionality of web applications. You can create Selenium scripts that examine specific functionality of a web application,...

read more
What is Data Loss Prevention (DLP)?

What is Data Loss Prevention (DLP)?

Find out what a data loss prevention solution is, how it works, and when you should consider adopting a DLP solution. What is Data Loss Prevention (DLP)? Data Loss Prevention solutions are security tools that help organizations to ensure that sensitive or critical...

read more
Businesses have specific security requirements for Android devices

Businesses have specific security requirements for Android devices

AV-TEST, a widely recognized independent testing organization, has launched a new type of comparative test of IT security products: Android security apps aimed at corporate users. We sat down with Head of Threat Detection Labs, Jiří Kropáč at ESET, to ask him a few...

read more
Safetica 9.6: How to achieve flexible security for remote companies?

Safetica 9.6: How to achieve flexible security for remote companies?

Companies around the world are switching to the home office often overnight. Safetica is striving to help them not only with its recommendations for working from home but also with the new version of its solution, which will be introduced in the upcoming...

read more
Why Balancing Access Controls For Managed File Transfer Matters

Why Balancing Access Controls For Managed File Transfer Matters

If you're using secure file transfer tools, chances are you're security conscious. Maybe you're working in a highly-regulated industry, or perhaps you don't want your company on the front page of the newspaper for getting hacked. Whatever the case, if you're securing...

read more
Windows Anti-Malware Market Share Report, May 2020

Windows Anti-Malware Market Share Report, May 2020

The OPSWAT Market Share Report provides monthly updates on the market share of leading anti-malware vendors and products. This report focuses on the market share of anti-malware products versus traditional antivirus engines, as they offer protection from a greater...

read more
4 Data Loss Prevention Strategies. Which one is right for your Organisation?

4 Data Loss Prevention Strategies. Which one is right for your Organisation?

Data loss is a scary word for any organisation that has a responsibility of storing any sensitive, especially customer Personal Identifiable Information (PII). Losses or accidental leaks of PII can result in hefty fines, loss of reputation and more...

read more
The Best Endpoint Protector Features for macOS

The Best Endpoint Protector Features for macOS

Over the last few years, macOS has gained an increasingly important role in enterprises. Bring-your-own-device (BYOD) and corporate-owned personally-enabled (COPE) policies have made it possible for employees to choose macOS as their preferred operating system. Macs...

read more
The Top Covid-19 Frauds

The Top Covid-19 Frauds

Cybercriminals have moved at lightning speed to exploit the mass movement to home working. Many Covid-19 themed phishing emails were launched in late January and today this has turned into a blizzard with little sign of abating. The emails deliver malware, either via...

read more