Resources

Whitepapers

Thorough research papers and reports from SecPod intelligence and security research teams

Resources

10 Cyber Hygiene Best Practices to Keep Attackers Away
April 25, 2020

While organizations across the globe keep growing, attackers are working to discover security loopholes and cause severe security havoc....

Click here to view
Endpoint Security – A New Approach
January 20, 2020

A new approach to endpoint security is indispensable. An approach that identifies risks in seconds (vulnerabilities and misconfigurations)...

Click here to view
Ransomware – A Billion Dollars A Year Cyber Crime
January 20, 2020

Ransomware is a form of malware that renders a computer, or personal data stored in it, inaccessible to its owner. A perpetrator uses...

Click here to view
Hacking Internet of Things (IOT) – A Case Study on DTH Vulnerabilities
January 20, 2020

As IoT grows, the attack surface also grows and all the loopholes/vulnerabilities present in the digital world will flow into our real...

Click here to view
Why MSSPs Love Our Solution
January 20, 2020

Every managed security service provider wants a competitive edge. The definitive goal of every MSSP is to deliver the utmost quality of...

Click here to view
Many Products, No Security
January 20, 2020

"We have many products, but very little security." This is a typical complaint when securing and managing an IT environment. Organizations...

Click here to view
Cyber Hygiene – Uncool But Necessary
January 20, 2020

If you analyze any of the recent published attacks, two patterns emerge, 80-90% of the attacks exploit an unpatched vulnerability or...

Click here to view
Vulnerability, Malware and Risk
December 5, 2019

Information Assurance is crucial to functioning of any organization. The ability to assure availability, confidentiality and...

Click here to view
Understanding and Responding to Ransomware Attacks
November 28, 2019

Ransomware is a malware, which prevents users from accessing the system or personal files by locking the system or by encrypting...

Click here to view
Vulnerability Management – Simplifying Complexity
October 28, 2019

Vulnerabilities are weaknesses in software, which can be exploited by attackers to gain control over computer systems, steal sensitive...

Click here to view
Endpoint Security Can Be Much More Effective and Less Costly
August 13, 2019

Organizations invest in many security products yet environments are subject to attacks and exploitation. The footprint of most...

Click here to view
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence
July 14, 2019

The Security Content Automation Protocol (SCAP) federates a number of open standards that are used to enumerate software...

Click here to view
Vulnerability Management : Common Concerns Addressed
June 20, 2019

The above statements accurately summarize the contradiction between CISO’s perception of vulnerability management and the reality...

Click here to view
An Introduction to Managing Compliance
May 28, 2019

Complex IT systems and their interactions are the reality of today’s business world. For an organisation to function...

Click here to view
Vulnerability Risk Assessment With Saner
March 28, 2019

Risk is an inalienable fact of life. It is so in the Cyber world as well. Understanding sources of risk and taking meaningful steps to...

Click here to view
Protecting Against “WannaCry” Using Saner Solution
February 10, 2019

In the last few days, we saw how “WannaCry” ransomware crippled 3 million Windows systems around 150 countries. Read WannaCry...

Click here to view
Top 10 Security Breaches of 2017 – and What To Do
October 28, 2018

Security attacks and breaches happen routinely, costing companies millions of dollars, along with a decline in their reputation and...

Click here to view
Enhance the MSSP Experience
October 10, 2018

In the modern enterprise, a proliferation of devices and the apps they can run has exposed the enterprise to an increasing number...

Click here to view

Latest updates from us

SecPod Featured as Security Solution for WFH by National Centre of Excellence, Government of India

September 15, 2020
Read Article

SecPod and SAT Get Together to Make Organisations More Cyber Hygienic

June 3, 2020
Read Article

Inflow Technologies Partners with SecPod to Enable Faster Delivery of Endpoint Security and Management Solutions

June 1, 2020
Read Article

Launch of SECPOD.ORG

July 10, 2008
Read Article

SecPod Partners with Greenbone

February 25, 2009
Read Article

SecPod Receives Oval Repository Top Contributor Award

July 2, 2009
Read Article

SecPod Wins OVAL Repository Top Contributor Award Once Again

October 5, 2009
Read Article

SecPod Technologies Makes Declaration to Adopt OVAL

December 28, 2010
Read Article

SecPod Technologies Announces the Release of OVAL Definitions Professional Feed

January 2, 2011
Read Article

SecPod Technologies Appoints Greg Pottebaum as Vice President, Business Development

August 12, 2011
Read Article

SecPod Technologies Announces the Release of Beta Version of SCAP Repo

June 22, 2012
Read Article

SecPod Debuts ANCOR and SANER, Its Security Platform and Vulnerability Mitigation Solution

December 12, 2013
Read Article

SecPod Announces SANER Personal, Free Vulnerability Protection Software for Home Computers

December 12, 2013
Read Article

SecPod to Demo SANER – Join Us in NULLCON, Goa 2014 at Booth S-8

February 11, 2014
Read Article

SecPod Announces SANER Business, Vulnerability Management Software for the Enterprise

June 6, 2014
Read Article

SecPod Updates Free SANER Personal Vulnerability Management Solution

June 20, 2014
Read Article

SecPod’s SanerNow Available For MAC OS X Platform

June 12, 2015
Read Article

SecPod Unveils SANER 2.0 with Endpoint Threat Detection and Response

March 6, 2016
Read Article

SecPod Announces Advanced Security to Shield Organizations from Ransomware

August 2, 2016
Read Article

SecPod Supports MSSP with Saner Endpoint Security Platform

August 25, 2016
Read Article

ESG Lab Confirms SanerNow Platform Reduces Complexity, Effort & Cost of Managing & Securing Endpoints

October 5, 2018
Read Article

SecPod SanerNow Wins ”Cutting Edge Vulnerability Assessment, Remediation, Patch & Configuration Management …

October 4, 2018
Read Article

Get notified
about our latest updates

View all our articles & keep
your security upto date

SecPod Blog