Skip to content
SecPod Blog
  • Blog Home
  • Research Labs
    • Security Research and Intelligence
    • Endpoint Security and Management
      • Endpoint Security
      • Endpoint Management
      • IT Asset Management
      • Patch Management
      • Regulatory Compliance
      • Threat Detection and Response
      • Vulnerability Management
    • Technology and Trends
      • Computer Engineering
      • COVID-19
      • Cyber Hygiene Framework
      • Remote Work
      • Security Automation
    • Support Center
      • IT Administrator Issues
      • SCAP Feed
  • About SecPod
    • Company
    • SecPod Culture
    • From CEO’s Desk
  • Contact
    • Contact Us
    • Schedule a SanerNow Demo
  • Subscribe Newsletter
  • Toggle website search
Search this website
Menu Close
  • Blog Home
  • Research Labs
    • Security Research and Intelligence
    • Endpoint Security and Management
      • Endpoint Security
      • Endpoint Management
      • IT Asset Management
      • Patch Management
      • Regulatory Compliance
      • Threat Detection and Response
      • Vulnerability Management
    • Technology and Trends
      • Computer Engineering
      • COVID-19
      • Cyber Hygiene Framework
      • Remote Work
      • Security Automation
    • Support Center
      • IT Administrator Issues
      • SCAP Feed
  • About SecPod
    • Company
    • SecPod Culture
    • From CEO’s Desk
  • Contact
    • Contact Us
    • Schedule a SanerNow Demo
  • Subscribe Newsletter
  • Toggle website search
Read more about the article Safeguarding Devices with Penetration Testing Vs. Vulnerability Scanning

Safeguarding Devices with Penetration Testing Vs. Vulnerability Scanning

  • Post author:Raunaak Mitra
  • Post published:March 23, 2022
  • Post category:Featured Articles/Technology and Trends/Vulnerability Management
  • Reading time:7 mins read

Identifying vulnerabilities in networks and devices and scanning them all through their life cycle until they are remediated is paramount.…

Continue ReadingSafeguarding Devices with Penetration Testing Vs. Vulnerability Scanning
Read more about the article Organized Cyber Crime In The Digital Era, Not Your Regular Mafia

Organized Cyber Crime In The Digital Era, Not Your Regular Mafia

  • Post author:Raunaak Mitra
  • Post published:March 4, 2022
  • Post category:Featured Articles/Vulnerability Management
  • Reading time:6 mins read

Cyberattacks have been around for over 30 years now. Organizations have witnessed and lived through the devastating effect of these…

Continue ReadingOrganized Cyber Crime In The Digital Era, Not Your Regular Mafia
Read more about the article Cyber Attacks Security Admins Should Brace For in 2022

Cyber Attacks Security Admins Should Brace For in 2022

  • Post author:Raunaak Mitra
  • Post published:February 4, 2022
  • Post category:Featured Articles/Remote Work/Vulnerability Management
  • Reading time:12 mins read

Cyber-attacks are becoming extensively aggressive with every passing day, week, month, and year. To add fuel to the gasoline, cyberattacks…

Continue ReadingCyber Attacks Security Admins Should Brace For in 2022
Read more about the article False Positives and the story of Rob’s failed Vulnerability Management Program

False Positives and the story of Rob’s failed Vulnerability Management Program

  • Post author:Raunaak Mitra
  • Post published:January 20, 2022
  • Post category:Featured Articles/IT Administrator Issues/SCAP Feed/Vulnerability Management
  • Reading time:9 mins read

Like most security admins, Rob is always on his toes to protect the digital infrastructure of his organization from bad…

Continue ReadingFalse Positives and the story of Rob’s failed Vulnerability Management Program
Read more about the article Your Action Plan to Secure your Network in 2022

Your Action Plan to Secure your Network in 2022

  • Post author:Raunaak Mitra
  • Post published:January 11, 2022
  • Post category:Featured Articles/Vulnerability Management
  • Reading time:8 mins read

With another year wrapped up and the dawn of a new year, there are oceans of uncharted waters in the…

Continue ReadingYour Action Plan to Secure your Network in 2022
Read more about the article ‘Out with the Old, in with the New,’ New Year Wishes from SecPod

‘Out with the Old, in with the New,’ New Year Wishes from SecPod

  • Post author:Raunaak Mitra
  • Post published:December 31, 2021
  • Post category:COVID-19/Cyber Hygiene Framework/Featured Articles
  • Reading time:3 mins read

It’s that time of the year! For starters, a heartfelt congratulations for everyone who successfully ventured into completing around the…

Continue Reading‘Out with the Old, in with the New,’ New Year Wishes from SecPod
Read more about the article How frequent will Ransomware attacks be in 2022?

How frequent will Ransomware attacks be in 2022?

  • Post author:Raunaak Mitra
  • Post published:December 30, 2021
  • Post category:Featured Articles/Vulnerability Management
  • Reading time:8 mins read

Ransomware has made its way into the consciousness of business owners and security admins over the past two years. As…

Continue ReadingHow frequent will Ransomware attacks be in 2022?
Read more about the article Safeguarding devices during Christmas and New Year Winter Holidays

Safeguarding devices during Christmas and New Year Winter Holidays

  • Post author:Raunaak Mitra
  • Post published:December 23, 2021
  • Post category:Featured Articles/Remote Work/SCAP Feed/Vulnerability Management
  • Reading time:6 mins read

Winter holidays are everyone's favorite time, especially for hackers. The holiday season is when people reach out to friends and…

Continue ReadingSafeguarding devices during Christmas and New Year Winter Holidays
Read more about the article Looking back at 2021’s Top Cyber Attacks

Looking back at 2021’s Top Cyber Attacks

  • Post author:Raunaak Mitra
  • Post published:December 17, 2021
  • Post category:Featured Articles/Patch Management/Vulnerability Management
  • Reading time:9 mins read

Since the inception of the Internet, cyberattacks have been a major concern globally. Due to the global pandemic, there is…

Continue ReadingLooking back at 2021’s Top Cyber Attacks
Read more about the article Are you Remediating High Risk and Critical Vulnerabilities First?

Are you Remediating High Risk and Critical Vulnerabilities First?

  • Post author:Raunaak Mitra
  • Post published:November 19, 2021
  • Post category:Endpoint Security/Vulnerability Management
  • Reading time:5 mins read

For the past two decades, vulnerability management and security compliance have gradually occupied an important spot in the list of…

Continue ReadingAre you Remediating High Risk and Critical Vulnerabilities First?
  • 1
  • 2
  • Go to the next page

Latest Webcast

Subscribe

Don't miss out!

Subscribe to our newsletter and get the latest updates.

We promise not to spam you. Unsubscribe at any time.
Invalid email address
Thanks for subscribing!

SanerNow Free Trial

Top Posts

  • Apple Fixes Multiple Security Vulnerabilities Including Three Zero-day Exploits!
  • Implementing Gartner Vulnerability Management Recommendations with SanerNow
  • Are Multiple VPNs Adversely Affecting IT Security?
  • Microsoft May 2023 Patch Tuesday Fixes 38 Vulnerabilities Including 3 Zero-day!
  • Navigating the Patch Management Lifecycle: From Identification to Validation

Recent Comments

  • Anna on Is “Prevention, Detection and Response” Uproar in the Information Security Industry?
  • ClearNetwork on No Alert Holidays With SanerNow
  • andrew on Endpoint Detection and Response: The Forthcoming of Incident Response and Cybersecurity
  • visitor on Apache Wicket : Defeating Encrypted And Stateful URLs
  • Mutakiu Hassan on Microsoft May 2022 Patch Tuesday Addresses 75 Vulnerabilities Including 3 Zero-Days

Archives

Categories

Copyright 2023 - SecPod. All Rights Reserved.