Vulnerability management has been a standard practice for more than 15 years now. Scanning, assessment, and remediation have occupied an important spot in an organization’s endpoint security practices. However, many old beliefs and approaches that were once working fine have turned out ineffective and outright wrong. Unknowingly sticking to outdated practices may give you a […]

Read More →

Business demands are driving a surge of enterprise endpoints. The average IT asset inventory is constantly growing with remote and heterogeneous devices used by multiple employees. While businesses take longer strides and step into bigger opportunities, it is essential to secure all the endpoints that keep the business running. According to a study, 30 percent […]

Read More →

The year is almost coming to an end. We’ve been practicing good personal hygiene at home, offices, and everywhere else to protect our loved ones. While we’ve been confined to our homes, crossing our fingers, and hoping the pandemic comes to an end, the dark underbelly of cyberspace has quietly grown its reaches far wide.  […]

Read More →

A critical and interesting vulnerability in the Netlogon Remote Protocol of the Windows server was patched by Microsoft team last month. This flaw discovered by the Cybersecurity firm Secura (dubbed as Zerologon), has received the highest severity score of 10.0. The vulnerability is identified as CVE-2020-1472 and allows an attacker to successfully compromise the vulnerable […]

Read More →