• August 9, 2022

    Unified Endpoint Management Enters the Mainstream Once upon a time, there was anti-virus. Then anti-spam, adware, malware protection, ransomware protection, mobile device protection, and on and on. As new threats appeared, the vendor community came out with a fix. According...

  • August 2, 2022

    Passwords Will Get Hacked: Be Ready May 5th of 2022 was celebrated as World Password Day. News stories were everywhere about how to improve password security, the best ways to implement multi-factor authentication, why a stronger password policy was needed,...

  • August 1, 2022

    Case Study: How Organizations Can Affordably Gain Security Technology and Expertise Faced with a shocking increase in security threats – a 500% increase in cybercrime in the last two years, according to one study – many organizations have responded by...

  • May 20, 2021

    Facebook Hack Makes Vulnerability Scanning More Important Than Ever Facebook Data Breach Impacts Billions of Users A recent data breach compromised the data and personal information of more than half a billion Facebook users. If your name or your company...

  • March 17, 2021

    Vulnerability Scanning vs. Penetration Testing: What’s the Difference? The Difference Between Vulnerability Scanning and Penetration Testing There is often confusion about the purpose of vulnerability scanning compared to penetration testing. Stated simply, vulnerability scanning deals with finding potential vulnerabilities, while...

  • February 26, 2021

    Do You Really Know How Vulnerable You Are? Vulnerability Scanning Plays an Essential Role in Modern Security How vulnerable is your IT security strategy? Sometimes you can get too cozy behind well-built fortifications and imposing defenses. The ancient Trojans offer...