SECURITY INSIGHT BLOG

Welcome to emt technology blog.
Podcast: How DevOps Teams Use Network Monitoring Tools

Podcast: How DevOps Teams Use Network Monitoring Tools

Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal-use-only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling. This is what has driven...

read more

Defend Your Digital Assets Against Cyberattacks: 5 Log Management Best Practices

Every device, OS and application in your IT environment generates a record of activities in the form of log files. These audit trails of activity provide valuable information when investigating security breaches and when submitting regulation compliance reports....

read more

Why Does Linux Need Data Loss Prevention?

Linux has earned a reputation of being the most secure operating system, but despite this, it still has its own security flaws. Deploying a secure operating system is an important starting point for every business, but even the most secure networks can be invaded....

read more

The Payment Card Industry (PCI) Introduces New Software Standards to Guard Against Theft

Over the last several years, billions of people have been victims of data breaches. According to the digital security firm Positive Technologies in a recent USA Today article, in the months of April, May and June of 2018 alone, 765 million people fell victim to a...

read more

Endpoint Protector Wins 3 Major Industry Awards

This year Endpoint Protector has been granted three awards already, that demonstrate our expertise, commitment, and innovation in the cybersecurity field. These latest recognitions, including the Infosec Awards 2019, the Cybersecurity Excellence Awards 2019 and the...

read more

All You Need To Know about the GLBA Compliance

Although better known for its privacy stipulations, the Gramm-Leach-Bliley Act (GLBA), also called the Financial Modernization Act of 1999, is a US federal law whose original purpose was to allow different types of financial institutions such as banks,...

read more

IS YOUR IDENTITY AT RISK FROM BIOMETRIC DATA COLLECTION?

When classifying the sensitivity of various types of data, few, if any, types of data rank higher in sensitivity than biometric data. Yet, while biometric data is increasingly collected with abandon, this practice is under-scrutinized, pushing us further in the...

read more

Podcast: How DevOps Teams Use Network Monitoring Tools

Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal-use-only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling. This is what has driven...

read more

What’s New in Endpoint Protector 5.2.0.5

A new release of Endpoint Protector is available for our clients and it presents the first version of a brand-new feature: Deep Packet Inspection. Currently available for macOS, the new functionality allows network traffic to be inspected for content....

read more

MyWorkspace Feature Update: Connecting to Remote Apps using Session hint / TSVUrl

The MyWorkspace team is thrilled to announce that connecting to remote apps using Session hint / TSVUrl (the Windows Server 2012/R2 way) is supported as of now. Connecting to Remote Apps using Session hint / TSVUrl Since Windows Server 2012/R2 the connection broker...

read more

5 Best Practices for PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements that helps businesses protect their payment systems from breaches, fraud and theft of cardholder data. Developed by the PCI Security Standards Council, PCI DSS...

read more

The importance of BullGuard’s Home Network Scanner

BullGuard’s Home Network Scanner monitors your home Wi-Fi network for vulnerabilities that could be exploited by hackers, such as open ports. Why is this important? Port scanning has long been a popular probing tactic among hackers. It is typically used as a...

read more

Software License Optimization Buy Only the Software You Need; Use All of the Software You Have-Edge Computing Will Create Business Advantage. Here Are 3 Things You’ll Need To Safely Use It.

The job of an ITAM team is never done, is it? Just when your software asset management program starts to mature, cloud and SaaS raise the bar on what’s needed to keep spending and risk under control.  Now that we are starting to see SaaS spend management and...

read more