Editorial
Expressions & POVs
Expert takes, practical perspectives, and opinionated security narratives.

Point of View
Preventing Cyber-Attacks with Continuous Posture Anomaly Management
Too much network traffic? Is a PDF reader or word processing application making a strange internet connection? Often such observations are considered as anomalies to detect a threat or an attack but not prevent them.

Point of View
Continuous Posture Anomaly Management – The Journey of Building Something New
During the development of technology products, one always aspires to solve the real-time problems of customers and people worldwide. A journey of developing and emancipating a new product is one thing that connects all of us, entrepreneurs, technology inventors, and developers.

Point of View
How to Achieve 100% Patch Compliance with SanerNow?
Patching has nevertheless been the most hectic task for IT teams. On average, organizations take a minimum of 12 days to deploy patches across devices. The time span increases while managing more devices in a network. Although it’s critical to achieve patch compliance to prevent cyberattacks and sa...

Point of View
The Uber Attack 2.0
A simple message on a secure(*cough) internal channel saying YOU HAVE BEEN HACKED is a terrifying nightmare for all employees, especially security teams, in an organization. But that’s what happened to Uber, the ride-share giant. Again! called the Uber attack. An attack like this should be detected ...





