SECURITY INSIGHT BLOG

Welcome to emt technology blog.
5 Ways Big Companies Protect their Data

5 Ways Big Companies Protect their Data

In recent years, data protection has become a must for all companies, no matter their size. While big organizations suffering data breaches such as Facebook, Orbitz or Quora are the ones making headlines, a more troubling reality awaits small and mid-sized companies:...

read more

5 Ways Big Companies Protect their Data

In recent years, data protection has become a must for all companies, no matter their size. While big organizations suffering data breaches such as Facebook, Orbitz or Quora are the ones making headlines, a more troubling reality awaits small and mid-sized companies:...

read more

HOW TO USE PRIVILEGED ACCESS MANAGEMENT FOR CYBER FORENSICS & SECURITY BREACH REMEDIATION

No one wants to respond to a security incident or a breach. Instead the highest priority should be to stop a cyberthreat before it compromises the organization. But in reality, preventing a cyberattack from landing is not always possible. The steps...

read more

Getting Started with Microsoft Power BI for your Service Desk

A modern Service Desk is driven by data. It has a huge amount of data, but that data is very hard to grasp for the human mind. The smart Service Desk Manager visualizes this data to make it consumable and prove assumptions with the visualized insights. The Getting...

read more

Top of the charts – again

BullGuard has done it again. BullGuard has scooped top honours in an AV-Test of antivirus software for home users. The independent testing, which assessed security software from eleven vendors, including BullGuard, was carried out between September and October this...

read more

End Of The Road For AlertFox

Starting January 1, 2019 AlertFox and associated services will no longer function as we sunset this Ipswitch product.  AlertFox has been a workhorse for hundreds of companies over the years helping them with website uptime and performance monitoring. So it is...

read more

All You Need to Know about the NIST Cybersecurity Framework

The last few years have transformed cybersecurity and data protection from niche concerns to major problems as both individuals and organizations suffered from an unprecedented wave of cyberattacks and data theft. Governments around the world have stepped up and have...

read more

The 5 Most Cringe-Worthy Privileged Data Breaches of 2018

Privileged attack vectors and stolen personally identifiable information (PII) obtained have been a constantly paired news item throughout 2018. In 2019, expect privileged attack vectors to continue to reign as the number one root cause of breaches for both consumer...

read more

GDPR 101 – your essential compliance starting point

Have you started preparing for GDPR compliance? If not, it’s time to get up to speed on what you need to do. Otherwise you expose your organization to a potentially significant financial penalty. The General Data Protection Regulation is the EU’s new law designed to...

read more

500 million customer details hacked

International hotel chain Marriott said the details of 500 million hotel guests has been stolen in a sweeping hack. The breach happened in 2014, but Marriott didn’t become aware of it until September this year. The hackers, or hacker, copied and encrypted...

read more

Software License Optimization Buy Only the Software You Need; Use All of the Software You Have-Get ready for the next evolution of digital business technology

On-premise applications are moving to the cloud. Software-as-a-Service (SaaS) is becoming the first choice for new technology deployments. The future holds an explosion of IoT devices that will generate greater amounts of data at even faster speeds. And then there are...

read more

New build updates DeepScan and LSR, introduces support for Swagger and Kerberos Auth

Acunetix version 12 (Windows build 12.0.181203110, Linux build 12.0.181204095) has been released. This new build includes updates to DeepScan and Login Sequence Recorder (LSR). It also introduces support for Swagger and Kerberos HTTP Authentication in the Windows...

read more

Data Protection Regulations in the Middle East

The EU’s General Data Protection Regulation has sparked a global legislative movement that aims to vouchsafe individuals’ privacy and curb data vulnerability. While some of these new regulations were years in the making, many were directly influenced by the...

read more