SECPOD’S REPORT ON PATCH TUESDAY UPDATES – Q1 2021March 24, 2021
Microsoft releases patches for hundreds of vulnerabilities on a single day. This makes it difficult to prioritize the patches and fix the...
Top Vulnerability Report 2020March 5, 2021
2020 Vulnerability Report Card is out! In this report, we have covered two types of vulnerabilities - 1. that are high or...
Endpoint Security – A New ApproachJanuary 20, 2020
A new approach to endpoint security is indispensable. An approach that identifies risks in seconds (vulnerabilities and misconfigurations)...
Ransomware – A Billion Dollars A Year Cyber CrimeJanuary 20, 2020
Ransomware is a form of malware that renders a computer, or personal data stored in it, inaccessible to its owner. A perpetrator uses...
Hacking Internet of Things (IOT) – A Case Study on DTH VulnerabilitiesJanuary 20, 2020
As IoT grows, the attack surface also grows and all the loopholes/vulnerabilities present in the digital world will flow into our real...
Why MSSPs Love Our SolutionJanuary 20, 2020
Every managed security service provider wants a competitive edge. The definitive goal of every MSSP is to deliver the utmost quality of...
Many Products, No SecurityJanuary 20, 2020
"We have many products, but very little security." This is a typical complaint when securing and managing an IT environment. Organizations...
Cyber Hygiene – Uncool But NecessaryJanuary 20, 2020
If you analyze any of the recent published attacks, two patterns emerge, 80-90% of the attacks exploit an unpatched vulnerability or...
Vulnerability, Malware and RiskDecember 5, 2019
Information Assurance is crucial to functioning of any organization. The ability to assure availability, confidentiality and...
Understanding and Responding to Ransomware AttacksNovember 28, 2019
Ransomware is a malware, which prevents users from accessing the system or personal files by locking the system or by encrypting...
Vulnerability Management – Simplifying ComplexityOctober 28, 2019
Vulnerabilities are weaknesses in software, which can be exploited by attackers to gain control over computer systems, steal sensitive...
Endpoint Security Can Be Much More Effective and Less CostlyAugust 13, 2019
Organizations invest in many security products yet environments are subject to attacks and exploitation. The footprint of most...
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat IntelligenceJuly 14, 2019
The Security Content Automation Protocol (SCAP) federates a number of open standards that are used to enumerate software...
Vulnerability Management : Common Concerns AddressedJune 20, 2019
The above statements accurately summarize the contradiction between CISO’s perception of vulnerability management and the reality...
An Introduction to Managing ComplianceMay 28, 2019
Complex IT systems and their interactions are the reality of today’s business world. For an organisation to function...
Vulnerability Risk Assessment With SanerMarch 28, 2019
Risk is an inalienable fact of life. It is so in the Cyber world as well. Understanding sources of risk and taking meaningful steps to...
Protecting Against “WannaCry” Using Saner SolutionFebruary 10, 2019
In the last few days, we saw how “WannaCry” ransomware crippled 3 million Windows systems around 150 countries. Read WannaCry...
Top 10 Security Breaches of 2017 – and What To DoOctober 28, 2018
Security attacks and breaches happen routinely, costing companies millions of dollars, along with a decline in their reputation and...
Enhance the MSSP ExperienceOctober 10, 2018
In the modern enterprise, a proliferation of devices and the apps they can run has exposed the enterprise to an increasing number...
Latest updates from us
SecPod SanerNow integrates with SIRP – Unique End-to-End Endpoint Security and Management combo with a Comprehensive SOAR SolutionDecember 8, 2020
SecPod Featured as Security Solution for WFH by National Centre of Excellence, Government of IndiaSeptember 15, 2020
SecPod and SAT Get Together to Make Organisations More Cyber HygienicJune 3, 2020
Inflow Technologies Partners with SecPod to Enable Faster Delivery of Endpoint Security and Management SolutionsJune 1, 2020
Launch of SECPOD.ORGJuly 10, 2008
SecPod Partners with GreenboneFebruary 25, 2009
SecPod Receives Oval Repository Top Contributor AwardJuly 2, 2009
SecPod Wins OVAL Repository Top Contributor Award Once AgainOctober 5, 2009
SecPod Technologies Makes Declaration to Adopt OVALDecember 28, 2010
SecPod Technologies Announces the Release of OVAL Definitions Professional FeedJanuary 2, 2011
SecPod Technologies Appoints Greg Pottebaum as Vice President, Business DevelopmentAugust 12, 2011
SecPod Technologies Announces the Release of Beta Version of SCAP RepoJune 22, 2012
SecPod Debuts ANCOR and SANER, Its Security Platform and Vulnerability Mitigation SolutionDecember 12, 2013
SecPod Announces SANER Personal, Free Vulnerability Protection Software for Home ComputersDecember 12, 2013
SecPod to Demo SANER – Join Us in NULLCON, Goa 2014 at Booth S-8February 11, 2014
SecPod Announces SANER Business, Vulnerability Management Software for the EnterpriseJune 6, 2014
SecPod Updates Free SANER Personal Vulnerability Management SolutionJune 20, 2014
SecPod’s SanerNow Available For MAC OS X PlatformJune 12, 2015
SecPod Unveils SANER 2.0 with Endpoint Threat Detection and ResponseMarch 6, 2016
SecPod Announces Advanced Security to Shield Organizations from RansomwareAugust 2, 2016
SecPod Supports MSSP with Saner Endpoint Security PlatformAugust 25, 2016
ESG Lab Confirms SanerNow Platform Reduces Complexity, Effort & Cost of Managing & Securing EndpointsOctober 5, 2018
SecPod SanerNow Wins ”Cutting Edge Vulnerability Assessment, Remediation, Patch & Configuration Management …October 4, 2018
about our latest updates
View all our articles keep
your security up to date