Skip to content
SecPod Blog
  • Blog Home
  • Research Labs
    • Security Research and Intelligence
    • Endpoint Security and Management
      • Endpoint Security
      • Endpoint Management
      • IT Asset Management
      • Patch Management
      • Regulatory Compliance
      • Threat Detection and Response
      • Vulnerability Management
    • Technology and Trends
      • Computer Engineering
      • COVID-19
      • Cyber Hygiene Framework
      • Remote Work
      • Security Automation
    • Support Center
      • IT Administrator Issues
      • SCAP Feed
  • About SecPod
    • Company
    • SecPod Culture
    • From CEO’s Desk
  • Request a SanerNow Demo
  • Subscribe Newsletter
  • Toggle website search
Search this website
Menu Close
  • Blog Home
  • Research Labs
    • Security Research and Intelligence
    • Endpoint Security and Management
      • Endpoint Security
      • Endpoint Management
      • IT Asset Management
      • Patch Management
      • Regulatory Compliance
      • Threat Detection and Response
      • Vulnerability Management
    • Technology and Trends
      • Computer Engineering
      • COVID-19
      • Cyber Hygiene Framework
      • Remote Work
      • Security Automation
    • Support Center
      • IT Administrator Issues
      • SCAP Feed
  • About SecPod
    • Company
    • SecPod Culture
    • From CEO’s Desk
  • Request a SanerNow Demo
  • Subscribe Newsletter
  • Toggle website search

Endpoint Security: Making Security Great Again

  • Post author:Rini
  • Post published:May 3, 2017
  • Post category:Endpoint Security and Management
  • Reading time:3 mins read

Over the past few years, enterprises have been hit by complex and advanced ransomware attacks. With a heroic entry, they…

Continue ReadingEndpoint Security: Making Security Great Again

How to Defeat Attack Enablers with Saner

  • Post author:Rini
  • Post published:April 5, 2017
  • Post category:Endpoint Security and Management
  • Reading time:3 mins read

Breaches continue to occur regardless of existing tools. In Feb 2017, a hack compromised the account details of more than…

Continue ReadingHow to Defeat Attack Enablers with Saner

A Look Back At 2016: The Year of Ransomware

  • Post author:Rini
  • Post published:January 6, 2017
  • Post category:Category(Default) - Do Not Use This/Security Research and Intelligence
  • Reading time:1 mins read

Ransomware was a popular topic in 2016. Ransomware attacks have become complex, targeted, and sophisticated. Many organizations infected with ransomware…

Continue ReadingA Look Back At 2016: The Year of Ransomware

Easy Ways to Get Hacked – Part IV

  • Post author:Rini
  • Post published:November 15, 2016
  • Post category:Endpoint Security and Management
  • Reading time:5 mins read

Weak Password: Access Granted The world saw two major hacks recently – Yahoo and LinkedIn. While LinkedIn compromised 117 million…

Continue ReadingEasy Ways to Get Hacked – Part IV

Easy Ways to Get Hacked – Part III

  • Post author:Rini
  • Post published:November 15, 2016
  • Post category:Endpoint Security and Management
  • Reading time:4 mins read

USB Scam: An Unsuspicious Attack in Action Security researchers Karsten Nohl and Jakob Lell at the Black Hat security conference…

Continue ReadingEasy Ways to Get Hacked – Part III

Our Most Loved Whitepaper

  • Post author:Rini
  • Post published:October 26, 2016
  • Post category:Endpoint Security and Management
  • Reading time:2 mins read

Ransomware continues to be popular among cyber criminals. According to a CNN report, cyber criminals collected over $209 million in…

Continue ReadingOur Most Loved Whitepaper

Easy Ways to Get Hacked – Part II

  • Post author:Rini
  • Post published:October 25, 2016
  • Post category:Endpoint Security and Management
  • Reading time:5 mins read

The Dangers of Drive-By Download Attack Drive-by-downloads are harmful pieces of software that are downloaded to an endpoint device as…

Continue ReadingEasy Ways to Get Hacked – Part II

Easy Ways to Get Hacked – Part I

  • Post author:Rini
  • Post published:October 19, 2016
  • Post category:Endpoint Security and Management
  • Reading time:5 mins read

The Great Perils of FPhishing Every year, many organizations fall victim to phishing attacks. Tens of millions of phishing emails…

Continue ReadingEasy Ways to Get Hacked – Part I

Healthcare’s Fight Against Ransomware

  • Post author:Rini
  • Post published:May 31, 2016
  • Post category:Category(Default) - Do Not Use This/Security Research and Intelligence
  • Reading time:1 mins read

Continue ReadingHealthcare’s Fight Against Ransomware

Healthcare Industry Security Challenges: Mitigating Risks Impacting Endpoint Devices

  • Post author:Rini
  • Post published:May 24, 2016
  • Post category:Endpoint Security and Management
  • Reading time:4 mins read

Today’s sophisticated and complex malware targets all industries, and the healthcare industry is becoming a popular choice amongst attackers. Healthcare…

Continue ReadingHealthcare Industry Security Challenges: Mitigating Risks Impacting Endpoint Devices
  • 1
  • 2
  • 3
  • Go to the next page

Latest Webcast

Subscribe

Don't miss out!

Subscribe to our newsletter and get the latest updates.

We promise not to spam you. Unsubscribe at any time.
Invalid email address
Thanks for subscribing!

SanerNow Free Trial

Top Posts

  • Critical RCE Flaw Discovered In Confluence: CVE-2023-22522
  • Combating Inactive, Guest Users & Anonymous logins with SanerNow
  • Google Fixes Chrome’s Sixth Zero-day Vulnerability in 2023
  • What is SOC 2? A Beginner’s Guide to Compliance
  • Why Agent-Based Scanner is Superior to Agentless Scanner for Vulnerability Management

Recent Comments

  • Anna on Is “Prevention, Detection and Response” Uproar in the Information Security Industry?
  • ClearNetwork on No Alert Holidays With SanerNow
  • andrew on Endpoint Detection and Response: The Forthcoming of Incident Response and Cybersecurity
  • visitor on Apache Wicket: Defeating Encrypted And Stateful URLs
  • Mutakiu Hassan on Microsoft May 2022 Patch Tuesday Addresses 75 Vulnerabilities Including 3 Zero-Days

Archives

Categories

Copyright 2023 - SecPod. All Rights Reserved.