Tune in and check out how you can secure your endpoints efficiently. Learn the best industrial practices, latest trends, research details, and much more.

Hackers Steal FireEye’s Red Teaming Tool Through a Highly-Sophisticated Attack

FireEye is an IT security company focusing on providing security products and services to its customers. On December 8th, 2020,…

Continue Reading Hackers Steal FireEye’s Red Teaming Tool Through a Highly-Sophisticated Attack

Closing the Ever-Widening Gap Between Vulnerability Detection and Patching

Security risk management is a complicated and time-consuming affair. Organizations spend many resources to make sure all their business operations…

Continue Reading Closing the Ever-Widening Gap Between Vulnerability Detection and Patching

Open-Source Vs. Commercial Vulnerability Management Tools: How a Free Tool Carries Hidden Challenges

When vulnerability management started out as a practice 15 years ago, the process was straightforward and simple in function. An…

Continue Reading Open-Source Vs. Commercial Vulnerability Management Tools: How a Free Tool Carries Hidden Challenges

What is Continuous Compliance and Why It’s More Than “Just a Perk”

Organizations regularly face compliance audits that keep them up at night every quarter or year-end. To secure PII (personally identifiable…

Continue Reading What is Continuous Compliance and Why It’s More Than “Just a Perk”

Check Out What’s New in SecPod SanerNow 4.7.0.0 release – The Most Awaited Features Are in Store!

At SecPod, we always work towards delivering exceptional features to help you get the best out of our product. SanerNow…

Continue Reading Check Out What’s New in SecPod SanerNow 4.7.0.0 release – The Most Awaited Features Are in Store!

5 Steps to Build an Effective Vulnerability Management Program

Vulnerability management is a standardized process across most organizations. However, even organizations that follow periodic compliance audits and patch software…

Continue Reading 5 Steps to Build an Effective Vulnerability Management Program

Are Endpoint Security Challenges Haunting You During Remote Work?

The scares of Halloween came very early this year in the form of COVID-19. Although organizations were eventually happy to…

Continue Reading Are Endpoint Security Challenges Haunting You During Remote Work?

UNC1945 Infiltrates Corporate Networks through a Solaris Zero-Day Bug

A new zero-day vulnerability in Oracle Solaris has been brought to light by the FireEye security research team, Mandiant. The…

Continue Reading UNC1945 Infiltrates Corporate Networks through a Solaris Zero-Day Bug

Three Takeaways from the National Security Agency’s Cybersecurity Advisory in October 2020

On October 20, 2020, the National Security Agency (NSA), a national-level intelligence agency of the United States Department of Defense,…

Continue Reading Three Takeaways from the National Security Agency’s Cybersecurity Advisory in October 2020