SECURITY INSIGHT BLOG

Welcome to emt technology blog.
How Endpoint Protector Helps with Remote Work

How Endpoint Protector Helps with Remote Work

More and more companies are allowing their employees to work remotely to protect their health and support government measures to curb the spread of the COVID-19 virus. They are now realizing the risks remote work poses to data protection and compliance with data...

read more
10 REASONS YOU SHOULD INVEST IN APPLICATION DEPENDENCY MAPPING

10 REASONS YOU SHOULD INVEST IN APPLICATION DEPENDENCY MAPPING

As businesses increasingly invest in technology and undertake digital transformation initiatives, the complexity and growth of the IT environment have exploded. Traditional methods for managing and keeping inventory of infrastructure are now out of date....

read more
Configure ‘Break Glass’ Emergency Access For Azure Active Directory

Configure ‘Break Glass’ Emergency Access For Azure Active Directory

In cloud computing generally and in Microsoft Azure specifically, the shared responsibility model means that both Microsoft and you (the customer) have a role to play in ensuring service high availability. Let's take identity, for example, Microsoft provides...

read more
IT Spending by Industry

IT Spending by Industry

In the Flexera 2020 State of Tech Spend report, we identified IT spending by industry across financial services, retail, healthcare, software, services, hosting, industrial and consumer products, transportation and logistics. We gathered IT spending data from...

read more
Adding Custom Vulnerability Checks to Your Acunetix Installation

Adding Custom Vulnerability Checks to Your Acunetix Installation

This document describes how to extend an Acunetix On-Premise installation with custom vulnerability checks. Even though a default installation of Acunetix already includes thousands of carefully crafted vulnerability checks, users with specific requirements and...

read more
IMPROVED CLOUD RECOMMENDATION ENGINE AND HYPER RESOURCE UTILIZATION IN V16.08.00

IMPROVED CLOUD RECOMMENDATION ENGINE AND HYPER RESOURCE UTILIZATION IN V16.08.00

We are excited to announce the general availability of Device42 v16.08.00, which includes a number of bug fixes as well as the following enhancements: CRE Annual and Monthly Cost Calculations Available for All Cloud Providers Device42’s Cloud Recommendation Engine...

read more
Why Enterprises Need a DLP Solution

Why Enterprises Need a DLP Solution

As enterprises expand, the amount of data they collect grows exponentially. From customer information and intellectual property to employee data and financial records, bigger companies accumulate the kind of highly sensitive information that attracts malicious...

read more
4 Key Trends in the Cybersecurity Industry

4 Key Trends in the Cybersecurity Industry

It’s safe to say that cyberthreats are increasing in overall sophistication. Just a few of the top predicted threats for this year include banking trojans, browser-based password hijacking attacks, and weaponized email attachments. This means that today’s businesses...

read more
Red Teaming – 5 Tips How to Do It Safely

Red Teaming – 5 Tips How to Do It Safely

Red team vs blue team exercises are a very effective method to evaluate the security posture of your business. However, red teaming carries certain risks that must be taken into consideration, both for the red team and the target business. The world of IT...

read more
Consumer Reports gives smart device makers an ultimatum

Consumer Reports gives smart device makers an ultimatum

Consumer Reports has drawn a red line, reminding manufacturers of smart devices that people have a right to privacy in their homes – and they need to raise the standard of security for their connected cameras, doorbells, and security systems. The letter was...

read more
Takedown breakdown: A roundup of global data privacy laws

Takedown breakdown: A roundup of global data privacy laws

Privacy law has come a long way since 1890. It was then, a full quarter-century after the end of the American Civil War, when the concept of an individual’s right to privacy first appeared in the U.S. with the publication of the Harvard Law Review article “A...

read more
Chatbots create Future of Work

Chatbots create Future of Work

Artificial intelligence (AI) and augmented reality (AR) are rapidly driving companies to digitalize, and these processes are affecting the way IT is organized, too. Now, in addition to being responsible for end-user support and hardware and software installation, IT...

read more
File Transfer Protocol (FTP) Vs. Managed File Transfer (MFT)

File Transfer Protocol (FTP) Vs. Managed File Transfer (MFT)

This article provides the detailed features comparison needed when the need for file transfer moves from occasional to operational. You've probably heard the axiom, "In an information economy, data is king," and know that data theft has become a multi-billion-dollar...

read more
3 REASONS TO ADD ASSET TRACKING TO YOUR CI/CD PIPELINE

3 REASONS TO ADD ASSET TRACKING TO YOUR CI/CD PIPELINE

If you’ve gotten your CI/CD implementation to a good place, you may be introducing over 100 new releases every day. This is great from a productivity standpoint, but not so much from an organizational standpoint. When your applications are updating faster than your...

read more
Mergers and Acquisitions: IT can make or break

Mergers and Acquisitions: IT can make or break

The business continues to boom. After years of record global merger and acquisition (M&A) growth, it looks like another good one for strategic expansion. With major deals like Charles Schwab’s announced merger with TD Ameritrade in late 2019, economists and...

read more
Improving Cybersecurity with Data Science

Improving Cybersecurity with Data Science

Companies are continually facing cyberthreats and cyberattacks in the dangerous digital world of today. Ideally, a well-equipped cybersecurity team is able to detect, thwart, and manage these threats as they arise, but sometimes they are simply spread too thin in one...

read more
Top 5 Internal Data Security Threats and How to Deal with Them

Top 5 Internal Data Security Threats and How to Deal with Them

When considering cybersecurity strategies for data protection, guarding against external threats is usually the first on the list. However, headline grabbing cyberattacks account for only half of the root causes of data breaches according to the 2019 Cost of a...

read more
Ransomware, a litmus test of enterprise preparedness

Ransomware, a litmus test of enterprise preparedness

Surveys and white papers consistently show that organizations identify ransomware breaches/attacks among their biggest security concerns. These often outweigh far more advanced threats like targeted attacks or cyber espionage that can go unnoticed for years, in which...

read more
How We Found Another XSS in Google with Acunetix

How We Found Another XSS in Google with Acunetix

You have to be a very lazy hacker not to try to find issues in Google. Link and I are not lazy but we may be a bit luckier than most. And we use good tools, which helps. Some time ago, we found an XSS in Google Cloud with the help of the Acunetix...

read more