Editorial
Expressions & POVs
Expert takes, practical perspectives, and opinionated security narratives.

Point of View
13 Years of Life at SecPod – While we were at building a great cyber security platform
During our 12th anniversary, I had spoken about experimenting. SecPod is a place where we all come together, every day, to create something extra-ordinary, experimenting at each step. While we chase that dream each day, what we leave behind or live through is life at SecPod. “Life is what happens to...

Point of View
What is Cyberhygiene? How a Cyberhygiene Framework is the Foundation of Trustworthy Security
Digital transformation has pushed the boundaries of business operations. With expanding boundaries, there’s a drastic increase in the probability of cyberattacks. Organizations of all industries and sizes are at risk. Even though organizations pay attention to security on some level, they still expe...

Point of View
Best Endpoint Security Strategies for CISO
When it comes to security attacks, studies show that 70% of the security breaches originate at endpoints. The need to maintain good cyber hygiene has gone up in recent times and will only keep increasing. With the global Pandemic and changing working norms, the role of CISOs has become more prevalen...

Point of View
Explore what’s new in SanerNow 4.8.0.0
At SecPod, we always strive towards making your endpoint security and management operations smooth and effective. To help you make the best out of SanerNow, we are happy to present SanerNow 4.8.0.0 release with many new enhancements and bug fixes. It consists enhancements in Patch management tool an...

Point of View
5 Tips on How to Effectively Foster Cyber Hygiene Practices Among your Remote Workers
As organizations embrace digital transformation and innovative ways of working in the current pandemic, keeping sensitive business information safe is a growing challenge for employers and employees. Studies indicate that nearly 25% of employees working from home do not know what security protocols ...

Point of View
How Single-Console Endpoint Security and Management Tools Make the IT Life Easier
The responsibilities of the average IT team are piling up. However, what was once confined to service, maintenance, and troubleshooting has become something bigger. Besides managing and maintaining assets, the IT team is now responsible for securing the IT landscape from cyber-attacks. Additionally,...

Point of View
It’s Time to Use What 2020 Taught Us and Get Back Up
2020 has been less than ideal for people from all walks of life. We saw the biggest worldwide pandemic in over a hundred years. Loss of life, country-wide lock-downs, heavy economic losses, demotivated people, and the list goes on. Although 2020 has been the toughest year for most of us, it still ga...

Point of View
Hackers Steal FireEye’s Red Teaming Tool Through a Highly-Sophisticated Attack
FireEye is an IT security company focusing on providing security products and services to its customers. On December 8th, 2020, FireEye made an announcement on their company blog reporting the theft of their red team assessment tool. The attack has become the talk of the month in the security commun...

Point of View
The System Administrator Problems and Solutions in IT Security!
The system administrator’s problems and solutions are never-ending. Technology is pushing boundaries and helping businesses make bigger and better decisions. The technocrats let it occupy a quiet but powerful spot in the organizational hierarchy. Yes, they are the system administrators. As cybersecu...
