SECURITY INSIGHT BLOG

Welcome to emt technology blog.
Safetica 9.5 – Ready for the cloud age

Safetica 9.5 – Ready for the cloud age

In the next few weeks, we will be launching a brand new version of Safetica DLP. Thanks to its new features, Version 9.5 follows the current trend of keeping sensitive data on cloud storage.   Take a quick look at what awaits you with the upcoming release....

read more
Safetica 9.5 – Ready for the cloud age

Safetica 9.5 – Ready for the cloud age

In the next few weeks, we will be launching a brand new version of Safetica DLP. Thanks to its new features, Version 9.5 follows the current trend of keeping sensitive data on cloud storage.   Take a quick look at what awaits you with the upcoming release....

read more
DOING A CLOUD MIGRATION? CHANGE YOUR BACKUP PLANS

DOING A CLOUD MIGRATION? CHANGE YOUR BACKUP PLANS

Only 60% of organizations have a plan for disaster recovery in the cloud, and most companies consider it difficult to back up data from the hybrid cloud, from big data applications, and from containers. Namely, it’s hard to back up and store data if you’re not sure...

read more
What’s New in Acunetix v13

What’s New in Acunetix v13

Check out what’s new in Acunetix v13. This brief presentation highlights the following features: Full integration with a network scanner for comprehensive vulnerability managementMalware scanning using Windows Defender or ClamAVThe revolutionary SmartScan...

read more
An Evolution of IoT Security Issues

An Evolution of IoT Security Issues

We have seen a boom in the world of the Internet of Things in the last few years – which means we have also seen an increase in security issues with said devices and networks. As we slowly transition into a world of total interconnectivity through these smart devices...

read more
What You Don’t Know About Your IT Assets Can Hurt You

What You Don’t Know About Your IT Assets Can Hurt You

Everyone knows what regulations are. Whether it’s HIPAA, GDPR, or some other long complicated acronym, we’re all familiar with the purpose. Compliance with these regulations is a totally different issue, though. To use GDPR as an example, a recent study showed that...

read more
Avira drives IoT security for the smart home with TP-Link’s new HomeCare™ Pro for routers

Avira drives IoT security for the smart home with TP-Link’s new HomeCare™ Pro for routers

Avira is pleased to be driving TP-Link’s new HomeCare™ Pro, the security platform launched at CES. This new combination of TP-Link’s router experience with Avira’s security expertise lets consumers easily ensure the privacy and security of their smart homes. Smart...

read more
Reclaim your Security, Privacy and Freedom

Reclaim your Security, Privacy and Freedom

Have you ever heard of Kevin Mitnick? He was a notorious hacker who used to be on the US government’s “Most Wanted” list. He served five years in prison for computer fraud. But since his release, he has built a career working as a security consultant. Today he is a...

read more
How to Securely Use USB Flash Drives

How to Securely Use USB Flash Drives

USB storage devices have long been a plague to companies’ data security. Since 2008 when a malware-infected USB flash drive caused the worst breach of US military computers in history, organizations have become more aware of the dangers USBs pose, but data...

read more
Data Privacy Vs. Data Protection

Data Privacy Vs. Data Protection

This article will stick to American usage — but remember that if you are operating globally, the terminology can get confusing. Data privacy and data protection are very closely interconnected, so much so that users often think of them as synonymous. But the...

read more
GDPR: What the Future Holds in Store

GDPR: What the Future Holds in Store

The E.U.’s General Data Protection Regulation (GDPR) entered into force just over one year ago. While the surge in fines that had initially been expected failed to materialize, the most fines by far, according to EY Law, have been imposed in Germany. Likewise, the...

read more
Why the health care industry may need rehab when it comes to data protection

Why the health care industry may need rehab when it comes to data protection

Health care data breaches are surging these days, with the first half of 2019 seeing 32 million patient records illicitly accessed. That’s more than double 2018’s total for the entire year. And 2018’s number was three times that of 2017. Last year’s largest breach?...

read more
Software Vulnerability Management: One Patch Tuesday to Rule Them All

Software Vulnerability Management: One Patch Tuesday to Rule Them All

On the second Tuesday of each month, many IT leaders rejoice—or maybe cringe, depending on their view—as software patches are released for Microsoft products. They call this day Patch Tuesday, and although it started with Microsoft, it hasn’t ended there. Vendors...

read more
DISCOVERY SCORE, CRE, GLOBAL SEARCH ENHANCEMENTS AND MORE IN V16.07.00

DISCOVERY SCORE, CRE, GLOBAL SEARCH ENHANCEMENTS AND MORE IN V16.07.00

We are excited to announce the general availability of Device42 v16.07.00, which includes a number of bug fixes as well as the following enhancements: Discovery Scores Improvements Device42 now provides discovery score data for UCS/ACI/Load Balancer, SNMP, and Nmap...

read more
2020 might deliver a Silver Linings Playbook for security

2020 might deliver a Silver Linings Playbook for security

Earlier this month I attended the Security Insight Summit in Greensboro, GA. As is always the case with these events, I learn a great deal from chatting with CISOs and security executives from a variety of enterprises, but there was something else that stood out at...

read more
Detect sensitive content with Safetica 8.3

Detect sensitive content with Safetica 8.3

Safetica originally started out as a context DLP. Back in the day, this was the market standard. In the past few years, however, the requirements for regulatory compliance and the consecutive switch of working tools have resulted in a new DLP need. Nowadays it is...

read more
Incredible but true: USB underestimated as a security risk

Incredible but true: USB underestimated as a security risk

The risks for companies resulting from cyberattacks are on the rise. This is partly due to the fact that malware can now infect networks in a number of different ways. At the same time, IT systems sometimes prove to have considerable security gaps. As a result,...

read more