When vulnerability management started out as a practice 15 years ago, the process was straightforward and simple in function. An IT admin would download non-commercial open-source tools for free, scan his environment for the few disclosed vulnerabilities, and mitigate them manually. The whole process would take months to complete, and that was still okay. Fast […]

Read More →

Vulnerability management is hard to execute as a continuous process in the long run. In huge networks of organizations, the number of devices, software applications, and the vulnerabilities associated with them is multiplying rapidly. The complexity of devices and software are always growing. Organizations are put in a tough spot when conducting risk assessment and […]

Read More →

On October 20, 2020, the National Security Agency (NSA), a national-level intelligence agency of the United States Department of Defense, released a cybersecurity advisory highlighting 25 vulnerabilities in commonly-used software that are currently under active exploitation. They released the advisory following a series of attacks targeted in the USA. Here’s what happened In September, analysts […]

Read More →

Cyber-attacks are busting in from all directions. The biggest and most widespread attack was in 2017, called Wannacry. More than 230,000 computers were affected by the ransomware amounting to more than $4 billion in losses. This attack was due to an old SMB protocol enabled in Windows devices. Microsoft had released a patch 2 months […]

Read More →

This year has forced us into a lot of new challenges in the digital world. During the first half of 2020, Microsoft has seen a 150% increase in vulnerabilities than the entirety of 2019. Security breaches and ransomware attacks are being reported at an alarming rate this year. Cybercriminals now have the icing on the […]

Read More →

Vulnerability management has been a standard practice for more than 15 years now. Scanning, assessment, and remediation have occupied an important spot in an organization’s endpoint security practices. However, many old beliefs and approaches that were once working fine have turned out ineffective and outright wrong. Unknowingly sticking to outdated practices may give you a […]

Read More →

COVID19 has taught the world the powerful lessons on personal hygiene. Given that work from home culture is turning out to be the new norm and big organizations are already passing regulations on continuing it for the next few years, cyber hygiene is an important topic the world should be prepared to handle now. Whether […]

Read More →

As the world fights for its survival against COVID19, most of us are now extra conscious about our hygiene. During this tough situation isn’t it important to look after the asset hygiene as well? 2020 is a year to remember throughout life. Many things have happened and maybe a lot to expect in the upcoming […]

Read More →

Practising healthy cyber hygiene measures are often considered a difficult task in many organizations. IT administrators try their best to implement good security practices in the network, however, it consumes a lot of effort and time. Also, these cyber hygiene measures are not just a one-time task and are needed to be performed continuously to […]

Read More →