SECURITY INSIGHT BLOG

Welcome to emt technology blog.
Protecting backups with PAM

Protecting backups with PAM

Backups need protection Backups are a good thing. Obviously! But they're important for much more than restoring a file deleted accidentally. When ransomware attacks, it sets out to cause as much disruption as possible. Often, the only escape (other than paying the...

read more
Protecting backups with PAM

Protecting backups with PAM

Backups need protection Backups are a good thing. Obviously! But they're important for much more than restoring a file deleted accidentally. When ransomware attacks, it sets out to cause as much disruption as possible. Often, the only escape (other than paying the...

read more
Protecting Critical Infrastructure from Advanced Cyberattacks

Protecting Critical Infrastructure from Advanced Cyberattacks

The frequency and severity of targeted cyberattacks from organizations around the world continue to increase. The latest example is the SolarWinds hack which targeted multiple government and private organizations. While experts are still analyzing the root cause and...

read more
7 technologies to help your business with GDPR compliance

7 technologies to help your business with GDPR compliance

In today’s global economy, businesses must be compliant with standards established by various countries so they can service customers around the world. One such regulation you can’t afford to ignore is the GDPR (General Data Protection Regulation), which is the core...

read more
Imagine If DevOps Environments Could Be Easily Automated

Imagine If DevOps Environments Could Be Easily Automated

Common DevOps Challenges A common activity for many developers is to quickly spin-up or refresh their dev or test environments as they're developing new features on investigating production issues. If you're someone that's familiar with tools like Vagrant and Ansible,...

read more
ESET’s cloud-first protection secures the shift to remote working

ESET’s cloud-first protection secures the shift to remote working

Cloudification, or the process of moving applications and services from local machines to those accessed over the internet, has long been a top priority for many businesses. By migrating resources to the cloud, they are made accessible from any location, which...

read more
5 Reasons Why Web Security Is as Important as Endpoint Security

5 Reasons Why Web Security Is as Important as Endpoint Security

Would you say that your company is secure if your employees are using laptops with no anti-malware installed at all? Most businesses would say that is an irresponsible approach. Then why would many businesses have websites and web applications with no protection at...

read more
How ITAM can close the door on asset vulnerabilities

How ITAM can close the door on asset vulnerabilities

Software either is or will be vulnerable. It’s rare that you won’t have to update out-of-date, unsupported or end-of-life software. If your job description involves software or IT asset management (SAM/ITAM), this is part of your day-to-day and nothing...

read more