SECURITY INSIGHT BLOG

Welcome to emt technology blog.
Version 1.4 of the ESET Enterprise Inspector: What’s new?

Version 1.4 of the ESET Enterprise Inspector: What’s new?

In 2018, ESET launched ESET Enterprise Inspector (EEI), a sophisticated Endpoint Detection & Response (EDR) tool that monitors endpoint activity for suspicious processes and executables, and triggers alarms based on specific rules. EDR tools are a vital component...

read more
NoSQL Injections and How to Avoid Them

NoSQL Injections and How to Avoid Them

A NoSQL injection vulnerability is an error in a web application that uses a NoSQL database. This web application security issue lets a malicious party bypass authentication, extract data, modify data, or even gain complete control over the application. NoSQL...

read more
EasyJet hack – 9 million customers affected – how to safeguard your personal data

EasyJet hack – 9 million customers affected – how to safeguard your personal data

The personal details of nine million customers of airline EasyJet have been accessed by hackers. The stolen information consists of email addresses and travel itineraries but some 2,208 customers also had their payment card details taken. The budget airline contacted...

read more
UPCOMING FRESHSERVICE INTEGRATION AND MORE IN V16.12.00

UPCOMING FRESHSERVICE INTEGRATION AND MORE IN V16.12.00

Upcoming Freshservice Integration Our Freshservice integration is currently working its way through approval on the Freshservice app store, but will allow users to directly integrate their Device42 and Freshservice applications to synchronize Device42 assets and...

read more
SaaS Cost Analysis – Getting the Upper Hand in SaaS Vendor Negotiations

SaaS Cost Analysis – Getting the Upper Hand in SaaS Vendor Negotiations

Organizations are ratcheting up how much they’re spending on cloud-based software—SaaS in particular—while cutting on-premises software. It’s likely that SaaS solutions already represent a rapidly growing part of your enterprise application portfolio. Do you have...

read more
To get the most from your data classification efforts, learn to think differently

To get the most from your data classification efforts, learn to think differently

If you’re implementing a risk-based schema, for it to go smoothly and to avoid confusion you need to take into account how others will perceive your classification labels. The classification of sensitive internal data may seem relatively straightforward. And in many...

read more
Teaching from your living room? Five tips for success

Teaching from your living room? Five tips for success

Teachers around the world are adapting to the “new normal” of remote teaching. And although the traditional school year is winding down, you should still be thinking about how to stay connected with your classroom from a distance.  Even if schools are able to...

read more
NEW DEVICE IGNORE RULES FEATURE AND DISCOVERY ENHANCEMENTS IN V16.11.00

NEW DEVICE IGNORE RULES FEATURE AND DISCOVERY ENHANCEMENTS IN V16.11.00

What to expect in v16.11.00: A new Device Ignore Rules feature to ignore specified infrastructure during discoveryMore Detailed VM Name CaptureDatabase Recovery Model DiscoverySNMP Discovery Updates While it’s generally a bad thing to ignore anyone or anything, in the...

read more
Corona Outbreak: Optimization of Remote Workspaces

Corona Outbreak: Optimization of Remote Workspaces

This post is also available in: German The corona virus pandemic has not only completely changed the day-to-day lives of Germans, but also the working world. Those who can and whose employer allows it are working from home. Since lockdown was put into place,...

read more
Technology Spend & Other CIO Challenges During COVID

Technology Spend & Other CIO Challenges During COVID

Just one quarter ago, CIOs were worried about many things, but pandemics were probably not even in the top 100 on the list of concerns. As we all know, in a matter of months, life and CIO priorities have changed dramatically. Worrying about customer experience with a...

read more
What is Remote File Inclusion (RFI)?

What is Remote File Inclusion (RFI)?

Using remote file inclusion (RFI), an attacker can cause the web application to include a remote file. This is possible for web applications that dynamically include external files or scripts. Potential web security consequences of a successful RFI attack range from...

read more
Facebook and GDPR: The Importance of Data Privacy

Facebook and GDPR: The Importance of Data Privacy

When the word “hacking” is mentioned in a conversation, people generally have the same image pop into their heads: a glasses-adorned hacker types furiously in front of several computer monitors while analyzing massive amounts of code to steal millions of dollars. He...

read more
What’s New in Endpoint Protector 5.2.0.8

What’s New in Endpoint Protector 5.2.0.8

We’re eager to announce that the new version of our award-winning Data Loss Prevention (DLP) solution has been released. Endpoint Protector 5.2.0.8 is out with the aim of offering enhanced data protection options during these challenging times. The COVID-19 pandemic...

read more
Top cybersecurity tips for start-ups businesses – and a great free offer

Top cybersecurity tips for start-ups businesses – and a great free offer

Cybersecurity at start-up businesses is one of those things that can be on the periphery. For sure, it’s important and it’s needed but for many business owners the main priority is to get the business up and running and then add in some basic security measures before...

read more
4 HORRIBLE MISTAKES YOU’RE MAKING WITH IT ASSET MANAGEMENT

4 HORRIBLE MISTAKES YOU’RE MAKING WITH IT ASSET MANAGEMENT

A good IT asset manager is great at demonstrating the value the IT department provides to the organization as a whole. Effective IT asset management (ITAM) enables the IT department to make smarter decisions by optimizing equipment and creating positive forward...

read more