SECURITY INSIGHT BLOG

Welcome to emt technology blog.
Podcast: How DevOps Teams Use Network Monitoring Tools

Podcast: How DevOps Teams Use Network Monitoring Tools

Many companies that never dreamed they’d be developing their own software are having to “roll their own.” Sometimes it’s an internal-use-only, as a custom layer over an existing platform like Salesforce, sometimes as a product they’re selling. This is what has driven...

read more

Defend Your Digital Assets Against Cyberattacks: 5 Log Management Best Practices

Every device, OS and application in your IT environment generates a record of activities in the form of log files. These audit trails of activity provide valuable information when investigating security breaches and when submitting regulation compliance reports....

read more

5 Best Practices for Data Breach Prevention in 2019

In today’s digital economy an increasing volume of information is collected and data is turning not only into a more valuable, but also into a more vulnerable resource. For businesses it has become a key input for growth, differentiation and for maintaining...

read more

MODERNIZING YOUR PRIVILEGED PASSWORD SECURITY

For those of us that make a habit of catching the nightly news, each day often seems like a replay of the previous: “Major Data Breach of Huge Corporation, details at 11.” And then you ask yourself, “could this happen to my organization?” Well, it can and probably...

read more

5 steps to building a security practice

The majority of my colleagues running a security practice ended up there by accident. Most of them inherited a security role through necessity or promotion and only a few choose a security career. Either way, we are special people that don’t see daylight...

read more

World Data Privacy Day – it’s incredibly important

January 28 is Data Privacy Day. It’s a landmark calendar event observed in the United States, Canada, India and 47 European countries and it's one which authorities take seriously. The US National Cyber Security Alliance and the Council of Europe lead the charge in...

read more

2019 Gartner Peer Insights Customers’ Choice for Software Asset Management Tools

For the second consecutive time, the Flexera team is pleased to announce that we have been recognized as a January 2019 Gartner Peer Insights Customers’ Choice for Software Asset Management Tools. We are extremely proud of this recognition, as feedback from...

read more

How to Verify a Cross-site Scripting Vulnerability

Analyzing web application vulnerabilities discovered by an automated scanner such as Acunetix often requires us to investigate further. This is in order to: Verify the vulnerability exists in the context of the application.Adjust the vulnerability payload reported by...

read more

5 Ways Big Companies Protect their Data

In recent years, data protection has become a must for all companies, no matter their size. While big organizations suffering data breaches such as Facebook, Orbitz or Quora are the ones making headlines, a more troubling reality awaits small and mid-sized companies:...

read more

HOW TO USE PRIVILEGED ACCESS MANAGEMENT FOR CYBER FORENSICS & SECURITY BREACH REMEDIATION

No one wants to respond to a security incident or a breach. Instead the highest priority should be to stop a cyberthreat before it compromises the organization. But in reality, preventing a cyberattack from landing is not always possible. The steps...

read more

Getting Started with Microsoft Power BI for your Service Desk

A modern Service Desk is driven by data. It has a huge amount of data, but that data is very hard to grasp for the human mind. The smart Service Desk Manager visualizes this data to make it consumable and prove assumptions with the visualized insights. The Getting...

read more

Top of the charts – again

BullGuard has done it again. BullGuard has scooped top honours in an AV-Test of antivirus software for home users. The independent testing, which assessed security software from eleven vendors, including BullGuard, was carried out between September and October this...

read more

End Of The Road For AlertFox

Starting January 1, 2019 AlertFox and associated services will no longer function as we sunset this Ipswitch product.  AlertFox has been a workhorse for hundreds of companies over the years helping them with website uptime and performance monitoring. So it is...

read more

All You Need to Know about the NIST Cybersecurity Framework

The last few years have transformed cybersecurity and data protection from niche concerns to major problems as both individuals and organizations suffered from an unprecedented wave of cyberattacks and data theft. Governments around the world have stepped up and have...

read more