Navigation
  • SEARCH HERE
  • SOLUTIONS
    • Information Security Solutions
      • Application Security Testing Solutions
      • Network & Infrastructure Security Solutions
      • Zero Trust Security
      • Security Information and Event Management
      • Remote Monitoring & Management (RMM)
      • File Integrity Management
      • Systems Administration Tools
      • Data Loss Prevention
      • Data / Password Recovery
      • IT Management Solutions
      • Identity and Access Management Solutions
      • Employee Activity Monitoring (EAM)
      • Digital Forensic Investigation
    • Software Development Solutions
      • Integrated Development Environments
      • Development Components
        • UI Tools
        • Networking Components
        • Office Components
        • Barcode Components
        • Communication Components
      • Imaging Solutions
      • Software Localization
      • Release Automation & Management
      • eLearning Authoring Solutions
      • Charting Solutions
      • PDF Solutions
      • Reporting Solutions
      • Testing & QA
      • Text Retrieval / Enterprise Search
      • Database
  • Services
    • Live Solution Walkthroughs
    • Implementation Services
    • Best Practices Consulting
    • Pre-Sales and Post-Sales Services
  • What's New
    • Our Event
    • Our Blogs
    • Special Offers
  • About
    • About LOGON Software Asia
    • Our Partnership
  • Publishers - Join our network
  • Resellers - Expand your portfolio
  • Procurement Managers
Site logo
  • Solutions
    • Information Security Solutions
          • Identity and Access Management
            • Privileged Access Management (PAM)
            • Multi-Factor Authentication (MFA)
            • Identification Verification (IV)
            • Self-Service Password Reset (SSPR)
          • Network & Infrastructure Security
            • DDoS Mitigation and Protection
            • Digital Forensic Investigation
            • Malware Detection & Analysis
            • Network Monitoring Software
            • Email Security
            • Log Monitoring
          • Endpoint & Device Security
            • Patch Management
            • Remote Monitoring & Management (RMM)
            • Employee Activity Monitoring (EAM)
            • Mobile Device Management (MDM)
          • IT Management
            • IT Service Management
            • IT Asset Management
            • Software Asset Management
            • Hardware Asset Management
            • Software License Management
            • Systems Administration Tools
          • Application Security
            • Application Security Testing (SAST, DAST, IAST, MAST, SCA)
            • Runtime Application Self-Protection
            • Web Application Firewall
          • Data Security
            • Data / Password Recovery
            • File Integrity Management
            • Data Loss Prevention
          • Cloud Security
            • Cloud Security Posture Management
            • Cloud Work Protection
          • External Attack Surface Management
            • Cyber Threat Intelligence
            • Third Party Risk Management
          • Security Operations & Incident Management
            • Security Information and Event Management
            • Security Orchestration, Automation and Response (SOAR)
          • Zero Trust Security
    • Software Development Solutions
      • Integrated Development Environments
      • Imaging Solutions
      • UI Tools
      • Charting Solutions
      • Developer Tools
      • Database
      • Networking Components
      • Office Components
      • Barcode Components
      • Release Automation & Management
      • Software Localization
      • Communication Components
      • Automated Testing
      • eLearning Authoring Solutions
      • Reporting Solutions
      • Text Retrieval / Enterprise Search
      • Testing & QA
  • Services
        • Live Walkthrough Sessions

          Experience the full feature of our key solutions through live platform

          View All Sessions >
        • Implementation Services
        • Pre-Sales and Post-Sales Services
        • Best Practices Consulting
  • Partners
    • Our Partners
    • Partner with LOGON Today!
      • Vendors - Join Our Network
      • Resellers - Expand Your Portfolio
      • Procurement Managers
  • Resources
        • ABOUT US

        • About Us
        • Our Locations
        • Careers@LOGON - We are hiring !
        • DISCOVER

        • Our BlogsNEW BLOGS
        • Our EventsJOIN UPCOMING EVENTS
        • LOGON to CyberSecurity PodcastNEW EPISODES
        • GET HELP

        • Contact Us
        • Help Desk
        • Request a Demo
        • Request a Quote
  • More results...

LOGON CyberSecurity Blog

It’s Time to Stop Relying on HTTP/1.1 — Before It Breaks You

It’s Time to Stop Relying on HTTP/1.1 — Before It Breaks You

For more than two decades, HTTP/1.1 has been the workhorse of the web. It powered the first generation of e-commerce,...
Read More
Inside the CoinDCX Breach: What Happened and How It Could Have Been Prevented

Inside the CoinDCX Breach: What Happened and How It Could Have Been Prevented

On July 19, 2025, CoinDCX—one of India’s largest cryptocurrency exchanges—confirmed a major security breach resulting in the loss of approximately...
Read More
Phishing 2.0 Bypasses Email Filters – Here’s How We Keep You Protected

Phishing 2.0 Bypasses Email Filters – Here’s How We Keep You Protected

In a rapidly evolving cyber threat landscape, phishing attacks continue to grow more sophisticated, leveraging novel techniques to bypass even...
Read More
DAST VS Manual Testing in Application Security

DAST VS Manual Testing in Application Security

Many corporate stakeholders still hold the outdated belief that having an in-house (or third-party) pen tester running manual tests once...
Read More
Review on Darknet Diaries Ep10: A Use Case for IT Asset Management in Government Cybersecurity

Review on Darknet Diaries Ep10: A Use Case for IT Asset Management in Government Cybersecurity

The recent episode of Darknet Diaries, a podcast on stories from the dark side of the internet, left a lasting...
Read More
Maximize your Cybersecurity ROI: Strategies for Smart Risk Prioritization

Maximize your Cybersecurity ROI: Strategies for Smart Risk Prioritization

As businesses rapidly adopt new technologies, move to the cloud, and rely more on third-party vendors, they unknowingly expand their...
Read More
Integrate AI into Application Security Testing: Best Practices for Continuous Security

Integrate AI into Application Security Testing: Best Practices for Continuous Security

For most banking companies in the APAC region, digital transformation isn’t just a buzzword—it is their reality. As a growing...
Read More
When Visibility Ends, Risk Begins: How A Bank Took Control of Its Digital Footprint with EASM

When Visibility Ends, Risk Begins: How A Bank Took Control of Its Digital Footprint with EASM

For most banking companies in the APAC region, digital transformation isn’t just a buzzword—it is their reality. As a growing...
Read More
Accelerating Patch Management: The 48-Hour Rule and NIST Guidelines

Accelerating Patch Management: The 48-Hour Rule and NIST Guidelines

Learn about the "48-Hour Rule" of patch management, showing the urgency to address vulnerabilities before exploitation occurs. Organizations must implement...
Read More
Navigating Hong Kong’s New Cybersecurity Law (CI Bill): What to Do Next

Navigating Hong Kong’s New Cybersecurity Law (CI Bill): What to Do Next

Learn about Hong Kong's Protection of Critical Infrastructures (Computer Systems) Bill ( the "CI Bill"), effective January 1, 2026. It...
Read More
“Banana Bait” – Click the Links, Fall for Scams: How Hong Kong is Battling Cyber Scams with Smart Identity and Access Management

“Banana Bait” – Click the Links, Fall for Scams: How Hong Kong is Battling Cyber Scams with Smart Identity and Access Management

In response to a surge in cyber scams, Hong Kong has launched an innovative public awareness campaign featuring the "despicable...
Read More
ConvoC2: A Red Teamer’s Tool to Exploit Microsoft Teams for Remote Command Execution

ConvoC2: A Red Teamer’s Tool to Exploit Microsoft Teams for Remote Command Execution

On December 15, 2024, cybersecurity enthusiasts and professionals were introduced to ConvoC2, a stealthy Command-and-Control (C2) infrastructure tool tailored for...
Read More
The New Fileless Remcos RAT Malware

The New Fileless Remcos RAT Malware

Cybercriminals are now leveraging an Excel vulnerability (CVE-2017-0199) in a recent phishing campaign to deliver a fileless variant of Remcos...
Read More
Over 470,000 Personal Data at risk: Data Breach at Oxfam Local Hong Kong

Over 470,000 Personal Data at risk: Data Breach at Oxfam Local Hong Kong

Oxfam Hong Kong recently fell victim to a cyberattack that potentially compromised the personal data of over 470,000 individuals, including...
Read More
Hong Kong Hospital Cyber Attack 2024: Lessons Learned and Steps Forward

Hong Kong Hospital Cyber Attack 2024: Lessons Learned and Steps Forward

We are here to investigate the recent cyber attack at one of Hong Kong’s Hospitals. The attack disrupted operations and...
Read More
2023 Rewind: What to Expect for Cyber Security in 2024?

2023 Rewind: What to Expect for Cyber Security in 2024?

The Boardroom Cybersecurity Report 2023 projects that organizations will allocate $9.5 trillion for cybercrime in 2024, rising to $10.5 trillion...
Read More
Security in Cloud Environment

Security in Cloud Environment

As the adoption of cloud services continues to surge, security teams in Asia find themselves navigating an intricate landscape. It...
Read More
AI and its impact on Cybersecurity

AI and its impact on Cybersecurity

It is without question that AI has become the hot topic of 2023, with it dominating our ways of business...
Read More
Top Crypto-Focused Malware Unveiled Amid Escalating Cyber Threats

Top Crypto-Focused Malware Unveiled Amid Escalating Cyber Threats

In a recent report, BlackBerry's cybersecurity arm revealed a concerning surge in crypto-focused malware as cyber threats continue to rise...
Read More
MOVEit Cyber Attack: cl0p Ransomware Gang Strikes Again

MOVEit Cyber Attack: cl0p Ransomware Gang Strikes Again

The cl0p ransomware gang strikes again, compromising organizations through the MOVEit file transfer protocol. With high-profile victims like EY and...
Read More
Unpacking the Cyber Threat Landscape in APAC: Insights from the Threat Intelligence Index

Unpacking the Cyber Threat Landscape in APAC: Insights from the Threat Intelligence Index

In recent years, Asia has become a hub for technology innovation, attracting businesses worldwide. However, as technology advances, so do...
Read More
Why You Shouldn’t Overlook Identifying Exploitable Vulnerabilities in your Attack Surface

Why You Shouldn’t Overlook Identifying Exploitable Vulnerabilities in your Attack Surface

In today's interconnected world, businesses rely heavily on technology to streamline their operations. However, this reliance also makes them vulnerable...
Read More
The Growing Influence of ChatGPT

The Growing Influence of ChatGPT

As ChatGPT has a growing influence on the cybersecurity world, many cybersecurity experts warn about the potential threats these AI...
Read More
Companies in Asia need to take Ransomware More Seriously

Companies in Asia need to take Ransomware More Seriously

With the start of 2023, companies in Asia are put at higher risk of being hit with ransomware attacks. Over...
Read More
Image

Subscribe to our Newsletter

Sign up for our regular updates on cybersecurity trends and solution offerings.

  • This field is for validation purposes and should be left unchanged.
  • This field is hidden when viewing the form

Press Release

LOGON and SysAid Partner to Accelerate AI-First ITSM Adoption Across Asia

LOGON and SysAid Partner to Accelerate AI-First ITSM Adoption Across Asia

Introducing World-Class SaaS Management Solution in Asia through Strategic Partnership with LOGON Software Asia and CloudEagle.ai

Introducing World-Class SaaS Management Solution in Asia through Strategic Partnership with LOGON Software Asia and CloudEagle.ai

Iron Software Announces Strategic Partnership with LOGON Software Asia to Reinforce Commitment to APAC Markets

Iron Software Announces Strategic Partnership with LOGON Software Asia to Reinforce Commitment to APAC Markets

Yogosha and LOGON Launch Vulnerability Operations Center in Asia

Yogosha and LOGON Launch Vulnerability Operations Center in Asia

Lansweeper partners with LOGON to deliver Asset Visibility for Cyber Security in Asia

Lansweeper partners with LOGON to deliver Asset Visibility for Cyber Security in Asia

Zecurion Partners with LOGON Software to Provide Insider Threat Prevention for Organizations in Hong Kong, India, Malaysia, Singapore and Thailand

Zecurion Partners with LOGON Software to Provide Insider Threat Prevention for Organizations in Hong Kong, India, Malaysia, Singapore and Thailand

Award-winning ImmuniWeb AI Platform expands its AI Automation and Acceleration Technology in Asia with LOGON Software Asia

Award-winning ImmuniWeb AI Platform expands its AI Automation and Acceleration Technology in Asia with LOGON Software Asia

Flexera/Revenera Certified Training and Best Practices Consulting available to customers in Asia, through partnership between TLUX Technologies and LOGON Software Asia

Flexera/Revenera Certified Training and Best Practices Consulting available to customers in Asia, through partnership between TLUX Technologies and LOGON Software Asia

Announcing a New Partnership with our Third-Party Application Security Vendor Reflectiz

Announcing a New Partnership with our Third-Party Application Security Vendor Reflectiz

Microsoft Gold Partner IS Decisions Brings MFA & Access Management Solutions to the Asian Market with LOGON Software Asia

Microsoft Gold Partner IS Decisions Brings MFA & Access Management Solutions to the Asian Market with LOGON Software Asia


Updates/Articles from our Partners

Mend.io is Recognized in the 2025 Gartner®Magic Quadrant™ for Application Security Testing
Application Security Blog Blog Mend.io Blog

Mend.io is Recognized in the 2025 Gartner®Magic Quadrant™ for Application Security Testing

Originally published by Mend.io. Mend.io has been acknowledged for addressing...
Read More
SysAid Recognized in the 2025 Gartner® Magic QuadrantTM for AI Applications in IT Service Management
Blog IT Management Blog ITSM Blog SysAid Blog

SysAid Recognized in the 2025 Gartner® Magic QuadrantTM for AI Applications in IT Service Management

Originally published by SysAid. SysAid is proud to announce its...
Read More
Introducing Mend.io’s AI Security Dashboard: A Clear View into AI Risk
Application Security Blog Blog Mend.io Blog

Introducing Mend.io’s AI Security Dashboard: A Clear View into AI Risk

Originally published by Mend.io. Mend.io provides an AI Security Dashboard...
Read More
ImmuniWeb Q3 2025 Product Updates: Expanded CTEM Solutions and AI-Powered Penetration Testing
Blog CTEM Blog ImmuniWeb Blog

ImmuniWeb Q3 2025 Product Updates: Expanded CTEM Solutions and AI-Powered Penetration Testing

Originally published by ImmuniWeb. This quarter, ImmuniWeb has implemented over...
Read More
It’s Time to Stop Relying on HTTP/1.1 — Before It Breaks You
Blog LOGON Blog

It’s Time to Stop Relying on HTTP/1.1 — Before It Breaks You

For more than two decades, HTTP/1.1 has been the workhorse...
Read More
ITSM in 2025 – What You Need to Know | SysAid
Blog IT Management Blog ITSM Blog SysAid Blog

ITSM in 2025 – What You Need to Know | SysAid

Originally published by SysAid. The world of IT service management...
Read More
Inside the CoinDCX Breach: What Happened and How It Could Have Been Prevented
Blog Identity and Access Management Blog LOGON Blog

Inside the CoinDCX Breach: What Happened and How It Could Have Been Prevented

On July 19, 2025, CoinDCX—one of India’s largest cryptocurrency exchanges—confirmed...
Read More
Phishing 2.0 Bypasses Email Filters – Here’s How We Keep You Protected
Blog EAM Blog Identity and Access Management Blog LOGON Blog Phishing Attack

Phishing 2.0 Bypasses Email Filters – Here’s How We Keep You Protected

In a rapidly evolving cyber threat landscape, phishing attacks continue...
Read More
DAST VS Manual Testing in Application Security
Application Security Blog Blog LOGON Blog

DAST VS Manual Testing in Application Security

Many corporate stakeholders still hold the outdated belief that having...
Read More
Review on Darknet Diaries Ep10: A Use Case for IT Asset Management in Government Cybersecurity
Blog IT Management Blog ITAM Blog Lansweeper Blog LOGON Blog

Review on Darknet Diaries Ep10: A Use Case for IT Asset Management in Government Cybersecurity

The recent episode of Darknet Diaries, a podcast on stories...
Read More
Maximize your Cybersecurity ROI: Strategies for Smart Risk Prioritization
Blog EASM Blog LOGON Blog

Maximize your Cybersecurity ROI: Strategies for Smart Risk Prioritization

As businesses rapidly adopt new technologies, move to the cloud,...
Read More
Integrate AI into Application Security Testing: Best Practices for Continuous Security
Application Security Blog Artificial Intelligence Blog LOGON Blog

Integrate AI into Application Security Testing: Best Practices for Continuous Security

For most banking companies in the APAC region, digital transformation...
Read More
ImmuniWeb Launches an Advanced Third-Party Risk Management (TPRM) Solution
Blog ImmuniWeb Blog Third-Party Risk

ImmuniWeb Launches an Advanced Third-Party Risk Management (TPRM) Solution

Originally published by ImmuniWeb. ImmuniWeb has launched ImmuniWeb® Discovery TPRM,...
Read More
When Visibility Ends, Risk Begins: How A Bank Took Control of Its Digital Footprint with EASM
Blog EASM Blog LOGON Blog

When Visibility Ends, Risk Begins: How A Bank Took Control of Its Digital Footprint with EASM

For most banking companies in the APAC region, digital transformation...
Read More
Q&A from The Future of AppSec Webinar | PortSwigger
Blog Portswigger Blog

Q&A from The Future of AppSec Webinar | PortSwigger

Originally published by PortSwigger. Portswigger recently wrapped up their biggest-ever...
Read More
Accelerating Patch Management: The 48-Hour Rule and NIST Guidelines
Blog Endpoint Security Blog LOGON Blog Patch Management Blog

Accelerating Patch Management: The 48-Hour Rule and NIST Guidelines

Learn about the "48-Hour Rule" of patch management, showing the...
Read More
Navigating Hong Kong’s New Cybersecurity Law (CI Bill): What to Do Next
Application Security Blog Blog LOGON Blog SaaS Procurement and Management Blog Software License Management Blog

Navigating Hong Kong’s New Cybersecurity Law (CI Bill): What to Do Next

Learn about Hong Kong's Protection of Critical Infrastructures (Computer Systems)...
Read More
“Banana Bait” – Click the Links, Fall for Scams: How Hong Kong is Battling Cyber Scams with Smart Identity and Access Management
Blog Identity and Access Management Blog LOGON Blog

“Banana Bait” – Click the Links, Fall for Scams: How Hong Kong is Battling Cyber Scams with Smart Identity and Access Management

In response to a surge in cyber scams, Hong Kong...
Read More
Reflectiz | New Research: The State of Web Exposure 2025
Blog Reflectiz Blog

Reflectiz | New Research: The State of Web Exposure 2025

Originally published by Reflectiz. This groundbreaking research is comprehensive in...
Read More
Top 10 Cybersecurity, Cybercrime, Cyber Law & AI Predictions for 2025 | ImmuniWeb
Blog ImmuniWeb Blog

Top 10 Cybersecurity, Cybercrime, Cyber Law & AI Predictions for 2025 | ImmuniWeb

Originally published by ImmuniWeb. After the successful launch of its...
Read More
InstallShield 2024 R2 Now Available!
Blog InstallShield Blog Revenera Blog

InstallShield 2024 R2 Now Available!

The InstallShield 2024 R1 version is now live, with new...
Read More
ConvoC2: A Red Teamer’s Tool to Exploit Microsoft Teams for Remote Command Execution
Blog Endpoint Security Blog LOGON Blog

ConvoC2: A Red Teamer’s Tool to Exploit Microsoft Teams for Remote Command Execution

On December 15, 2024, cybersecurity enthusiasts and professionals were introduced...
Read More
UserLock 12.2 Now Live | IS Decisions
Blog ISDecision Blog UserLock

UserLock 12.2 Now Live | IS Decisions

Originally published by IS Decisions. Get early access to 2FA...
Read More
The New Fileless Remcos RAT Malware
Blog Identity and Access Management Blog LOGON Blog Phishing Attack Ransomware Zero Trust Security Blog

The New Fileless Remcos RAT Malware

Cybercriminals are now leveraging an Excel vulnerability (CVE-2017-0199) in a...
Read More
InstallAnywhere 2024 Now Available!
Blog InstallAnywhere Blog Revenera Blog

InstallAnywhere 2024 Now Available!

The InstallShield 2024 R1 version is now live, with new...
Read More
LOGON at Cyber Security World Asia, Tech Week Singapore 2024!
Blog Events Exhibition StormWall Blog

LOGON at Cyber Security World Asia, Tech Week Singapore 2024!

Join LOGON at Cybersecurity World Asia 2024 in Singapore TechWeek,...
Read More
Comply with NIS2 Directive MFA requirements | IS Decisions
Blog ISDecision Blog UserLock

Comply with NIS2 Directive MFA requirements | IS Decisions

Originally published by IS Decisions. Learn how UserLock simplifies NIS2...
Read More
Summer 2024 Launch: What’s New in Lansweeper
Blog Lansweeper Blog

Summer 2024 Launch: What’s New in Lansweeper

Summer is here, and so is the exciting Lansweeper 2024...
Read More
CrowdStrike Update Causes BSOD Issues Globally | Lansweeper
Blog Lansweeper Blog

CrowdStrike Update Causes BSOD Issues Globally | Lansweeper

Banks, airlines, supermarkets, broadcasters, and more are experiencing Blue Screen...
Read More
All in one place: Discovery and security testing across your APIs and applications
Blog Invicti Blog

All in one place: Discovery and security testing across your APIs and applications

API security and application security belong together—and with Invicti’s API...
Read More
Personalize your scanning experience with custom scan checks | PortSwigger
Blog Portswigger Blog

Personalize your scanning experience with custom scan checks | PortSwigger

Originally published by PortSwigger. Introducing a powerful new feature in...
Read More
InstallShield 2024 Now Available!
Blog InstallShield Blog Revenera Blog

InstallShield 2024 Now Available!

The InstallShield 2024 R1 version is now live, with new...
Read More
AdminStudio 2024 Now Available! | Flexera
Blog Flexera Blog

AdminStudio 2024 Now Available! | Flexera

Originally published by Flexera. Check out AdminStudio 2024 New Release,...
Read More
6 Steps Implementing FastPass IVM for Secure User Verification: A Project Manager’s Guide | FastPassCorp
Blog FastPassCorp IVM Blog

6 Steps Implementing FastPass IVM for Secure User Verification: A Project Manager’s Guide | FastPassCorp

Originally published by FastPassCorp. In today's digital landscape, securing IT...
Read More
Introducing DAST scanning in the Cloud | PortSwigger
Blog Portswigger Blog

Introducing DAST scanning in the Cloud | PortSwigger

Originally published by PortSwigger. We understand the unique challenges AppSec...
Read More
Protecting Healthcare Users Against Identity Theft at the IT Help Desk | FastPassCorp
Blog FastPassCorp IVM Blog

Protecting Healthcare Users Against Identity Theft at the IT Help Desk | FastPassCorp

Originally published by FastPassCorp. In the healthcare industry, where patient...
Read More
Revolutionizing IT Help Desk Security and Efficiency with FastPass on ServiceNow
Blog FastPassCorp IVM Blog

Revolutionizing IT Help Desk Security and Efficiency with FastPass on ServiceNow

Originally published by FastPassCorp. In today’s digital workplace, securing employee...
Read More
Burp Suite Enterprise Edition spring update 2024 | PortSwigger
Blog Portswigger Blog

Burp Suite Enterprise Edition spring update 2024 | PortSwigger

Originally published by PortSwigger. We understand the unique challenges AppSec...
Read More
What’s New in UserLock 12 | IS Decisions
Blog ISDecision Blog UserLock

What’s New in UserLock 12 | IS Decisions

Originally published by IS Decisions. Get early access to 2FA...
Read More
Enhancing IT Help Desk Security: A Guide to Robust User Verification
Blog FastPassCorp IVM Blog

Enhancing IT Help Desk Security: A Guide to Robust User Verification

Originally published by FastPassCorp. This blog explores the delicate balance...
Read More
Addressing NVD Disruption: The Role of DeviceTotal | DeviceTotal
Blog DeviceTotal Blog

Addressing NVD Disruption: The Role of DeviceTotal | DeviceTotal

Originally published by DeviceTotal. The article emphasizes the importance of...
Read More
Unleashing the power of brand consistency: The key to supercharging trust | Exclaimer
Blog Exclaimer Blog

Unleashing the power of brand consistency: The key to supercharging trust | Exclaimer

Originally published by Exclaimer. Maintaining a consistent brand narrative across...
Read More
5 reasons why email is still a powerful business tool | Exclaimer
Blog Exclaimer Blog

5 reasons why email is still a powerful business tool | Exclaimer

Originally published by Exclaimer. Email remains a cornerstone of business...
Read More
UserLock 12.1 Now Live | IS Decisions
Blog ISDecision Blog UserLock

UserLock 12.1 Now Live | IS Decisions

Originally published by IS Decisions. Get early access to 2FA...
Read More
What Is Software Asset Management (SAM)? | Lansweeper
Blog Lansweeper Blog

What Is Software Asset Management (SAM)? | Lansweeper

In this discourse, we explore software asset management (SAM) and...
Read More
Navigating the Complexities of Password Synchronization with Entra (Azure AD)
Blog FastPassCorp SSPR Blog

Navigating the Complexities of Password Synchronization with Entra (Azure AD)

Originally published by FastPassCorp. In the ever-evolving world of corporate...
Read More
Getting Ready for NIS2 with Lansweeper
Blog Lansweeper Blog

Getting Ready for NIS2 with Lansweeper

On October 17, 2024, the European Union will implement its...
Read More
What is External Attack Surface Management (EASM) and How Can You Secure It? | CybelAngel
Blog CybelAngel Blog

What is External Attack Surface Management (EASM) and How Can You Secure It? | CybelAngel

Originally published by CybelAngel. In 2005, a group posing as...
Read More
Understanding the Financial Impact of Data Breaches: Insights from IBM’s 2023 Report | FastPassCorp
Blog FastPassCorp SSPR Blog

Understanding the Financial Impact of Data Breaches: Insights from IBM’s 2023 Report | FastPassCorp

Originally published by FastPassCorp. AI-driven voice-generating software has taken on...
Read More
Revolutionizing engagement: 6 marketing trends to watch in 2024 | Exclaimer
Blog Exclaimer Blog

Revolutionizing engagement: 6 marketing trends to watch in 2024 | Exclaimer

Originally published by Exclaimer. In 2024, the once-worked marketing strategies...
Read More
Why is an Email Spoofing Tool Important? How to Detect and Prevent? | Trustifi
Blog Trustifi Blog

Why is an Email Spoofing Tool Important? How to Detect and Prevent? | Trustifi

Originally published by Trustifi. Email Spoofing remains a prevalent tactic...
Read More
Driving instant feedback for Tobermore | Exclaimer
Blog Exclaimer Blog

Driving instant feedback for Tobermore | Exclaimer

Originally published by Exclaimer. Tobermore’s marketing teams, relying on email...
Read More
Making every sign-off count for Make-A-Wish UK | Exclaimer
Blog Exclaimer Blog

Making every sign-off count for Make-A-Wish UK | Exclaimer

Originally published by Exclaimer. Exclaimer helped Make-A-Wish UK with centralized...
Read More
Why is Deepfake Phishing Becoming a 2024 Problem? | Trustifi
Blog Trustifi Blog

Why is Deepfake Phishing Becoming a 2024 Problem? | Trustifi

Originally published by Trustifi. In the critical election year, AI-generated...
Read More
7 Tips for Implementing SOAR in Your Organization’s Cloud Infrastructure | Cloudnosys
Blog Cloudnosys Blog

7 Tips for Implementing SOAR in Your Organization’s Cloud Infrastructure | Cloudnosys

Originally published by Cloudnosys. SOAR involves integrating various security tools,...
Read More
How to Ensure an Organization’s Google Cloud Security? 8 GCP Security Best Practices to Follow Today! | Cloudnosys
Blog Cloudnosys Blog

How to Ensure an Organization’s Google Cloud Security? 8 GCP Security Best Practices to Follow Today! | Cloudnosys

Originally published by Cloudnosys. This blog will discuss how context-aware...
Read More
Agentless Vulnerability management for IoT and OT | DeviceTotal
Blog DeviceTotal Blog

Agentless Vulnerability management for IoT and OT | DeviceTotal

Originally published by DeviceTotal. The article emphasizes the importance of...
Read More
Ninja Rated the #1 RMM on G2 for the 10th Time in a Row | NinjaOne
Blog NinjaOne Blog

Ninja Rated the #1 RMM on G2 for the 10th Time in a Row | NinjaOne

Originally published by NinjaOne. NinjaOne ranked #1 in Customer Satisfaction,...
Read More
New year, new signature: Power up your marketing with our new features | Exclaimer
Blog Exclaimer Blog

New year, new signature: Power up your marketing with our new features | Exclaimer

Originally published by Exclaimer. This new year, ignite the true...
Read More
What is a managed online backup (MOB) service? | Acronis
Acronis Blog Blog Cyber Protect Cloud

What is a managed online backup (MOB) service? | Acronis

Originally published by Acronis. The article discusses Managed Online Backup...
Read More
Why does Vulnerability explanation always plays a major part in almost every cyber attack | DeviceTotal
Blog DeviceTotal Blog

Why does Vulnerability explanation always plays a major part in almost every cyber attack | DeviceTotal

Originally published by DeviceTotal. Understanding and addressing vulnerabilities are crucial...
Read More
Top Benefits of Network Monitoring | Nagios
Blog Nagios Blog

Top Benefits of Network Monitoring | Nagios

Originally published by Nagios. Network monitoring enormously benefits your daily...
Read More
What is Network Monitoring and How Can I Make it Work for Me? | Nagios
Blog Nagios Blog

What is Network Monitoring and How Can I Make it Work for Me? | Nagios

Originally published by Nagios. Network monitoring empowers you to effectively...
Read More
How to create an effective MSP helpdesk | Acronis
Acronis Blog Blog Cyber Protect Cloud

How to create an effective MSP helpdesk | Acronis

Originally published by Acronis. The comprehensive guide outlines the key...
Read More
Reflectiz | JavaScript Security in 2023: The Complete Guide to Stay Secure
Blog Reflectiz Blog

Reflectiz | JavaScript Security in 2023: The Complete Guide to Stay Secure

Originally published by Reflectiz. In an era of expanding cyber...
Read More
7 Tips for Implementing SOAR in Your Organization’s Cloud Infrastructure | Cloudnosys
Blog Cloudnosys Blog

7 Tips for Implementing SOAR in Your Organization’s Cloud Infrastructure | Cloudnosys

Originally published by Cloudnosys. SOAR involves integrating various security tools,...
Read More
Using predictive AI to protect against holiday phishing scams and other brand threats | Bfore.AI
Bfore.AI Blog Blog Brand Attack Phishing Attack

Using predictive AI to protect against holiday phishing scams and other brand threats | Bfore.AI

Originally published by Bfore.AI. Businesses face significant cybersecurity challenges during...
Read More
Lansweeper and TeamViewer Announce Partnership | Complete Visibility & Remote Connectivity
Blog Lansweeper Blog

Lansweeper and TeamViewer Announce Partnership | Complete Visibility & Remote Connectivity

LOGON is a Lansweeper Managed Service Partner. We help customers...
Read More
ImmuniWeb Receives Its 10th Award in 2023 for Technical Excellence
Blog ImmuniWeb Blog

ImmuniWeb Receives Its 10th Award in 2023 for Technical Excellence

Originally published by ImmuniWeb. Congratulations to ImmuniWeb for being honored...
Read More
Reflectiz | How to Secure Your Website Against Shadow Code Threats
Blog Reflectiz Blog

Reflectiz | How to Secure Your Website Against Shadow Code Threats

Originally published by Reflectiz. In an era of expanding cyber...
Read More
BforeAI Recognized Again in Latest Gartner® Emerging Tech Reports | Bfore.AI
Bfore.AI Blog Blog Brand Attack Phishing Attack

BforeAI Recognized Again in Latest Gartner® Emerging Tech Reports | Bfore.AI

Originally published by Bfore.AI. BforeAI has been acknowledged in two...
Read More
New Release: JProfiler 14.0 | ej Technologies
Blog ej Technologies Blog JProfiler

New Release: JProfiler 14.0 | ej Technologies

Originally published by ej Technologies. JProfiler 14 adds full support...
Read More
FileAudit 6.5 Now Live!
Blog FileAudit ISDecision Blog

FileAudit 6.5 Now Live!

Originally published by ISDecisions. FileAudit 6.5 is now live with...
Read More
Reflectiz Wins Top InfoSec Innovator Award for 2023!
Blog Reflectiz Blog

Reflectiz Wins Top InfoSec Innovator Award for 2023!

Originally published by Reflectiz. We are delighted to share that...
Read More
LinkedIn as the Trojan Horse at MGM: The Rising Threat of Social Engineering in IT Security | FastPassCorp
Blog FastPassCorp SSPR Blog

LinkedIn as the Trojan Horse at MGM: The Rising Threat of Social Engineering in IT Security | FastPassCorp

Originally published by FastPassCorp. The attackers ingeniously combined social engineering...
Read More
Reflectiz | Exposure Management: Proven Strategies and Best Practices
Blog Reflectiz Blog

Reflectiz | Exposure Management: Proven Strategies and Best Practices

Originally published by Reflectiz. Learn the essential best practices for...
Read More
Indeed Identity is now Axidian: Where Security Finds Its Axis
Axidian Blog Blog

Indeed Identity is now Axidian: Where Security Finds Its Axis

Originally published by Axidian. Axidian is a newly rebranded company...
Read More
Reflectiz | C2 Server: The Brain of Client-Side Attacks Exposed
Blog Reflectiz Blog

Reflectiz | C2 Server: The Brain of Client-Side Attacks Exposed

Originally published by Reflectiz. Take a deep dive into the...
Read More
ImmuniWeb to Unveil Neuron Mobile
Blog ImmuniWeb Blog

ImmuniWeb to Unveil Neuron Mobile

Originally published by ImmuniWeb. Introducing ImmuniWeb® Neuron Mobile, a 100%...
Read More
LOGON at CyberSecurity World Asia, Tech Week Singapore 2023!
Blog Cloudnosys Blog Events Exhibition ImmuniWeb Blog Lansweeper Blog

LOGON at CyberSecurity World Asia, Tech Week Singapore 2023!

Join LOGON at Cybersecurity World Asia 2023 in Singapore TechWeek,...
Read More
How AI Voice Mimicking is a Security Risk | FastPassCorp
Blog FastPassCorp SSPR Blog

How AI Voice Mimicking is a Security Risk | FastPassCorp

Originally published by FastPassCorp. AI-driven voice-generating software has taken on...
Read More
Password Reset Best Practices | FastPassCorp
Blog FastPassCorp SSPR Blog

Password Reset Best Practices | FastPassCorp

Originally published by FastPassCorp. FastPass delves into the realm of...
Read More
Unmasking the Latest Magecart Attacks on Shopify: Exclusive Interview with Ysrael Gurt, Co-Founder and CTO of Reflectiz
Blog Magecart & Web-Skimming Reflectiz Blog

Unmasking the Latest Magecart Attacks on Shopify: Exclusive Interview with Ysrael Gurt, Co-Founder and CTO of Reflectiz

Originally published by Reflectiz. In this exclusive interview, Reflectiz delves...
Read More
Insights into SSPR Best Practices | FastPassCorp
Blog FastPassCorp SSPR Blog

Insights into SSPR Best Practices | FastPassCorp

Originally published by FastPassCorp. In today's era of process automation,...
Read More
How should IT help desks securely verify the identity of users who are calling for password reset assistance? | FastPass
Blog FastPassCorp IVM Blog

How should IT help desks securely verify the identity of users who are calling for password reset assistance? | FastPass

Originally published by FastPassCorp. The content discusses best practices for...
Read More
Runtime Application Self Protection (RASP) – The Next Step Up To App Security | SecIron
Blog SecIron Blogs

Runtime Application Self Protection (RASP) – The Next Step Up To App Security | SecIron

Originally published by SecIron. Protecting applications from cybercriminals is a...
Read More
10 signs that your mobile device is compromised | SecIron
Blog SecIron Blogs

10 signs that your mobile device is compromised | SecIron

Originally published by SecIron. Although Apple and Google strive to...
Read More
New Release: Axidian Privilege 2.8
Axidian Blog Blog

New Release: Axidian Privilege 2.8

Originally published by Axidian. With Axidian Privilege 2.8., resource management...
Read More
Next Generation DLP For Real Estate | Zecurion
Blog Data Loss Prevention Insider Threat Zecurion Blog

Next Generation DLP For Real Estate | Zecurion

Originally published by Zecurion. New technologies and devices have made...
Read More
Key Types of Occupational Fraud: Recognizing the Problem | Zecurion
Blog Data Loss Prevention Insider Threat Zecurion Blog

Key Types of Occupational Fraud: Recognizing the Problem | Zecurion

Originally published by Zecurion. New technologies and devices have made...
Read More
InstallShield 2023 Now Available!
Blog InstallShield Blog Revenera Blog

InstallShield 2023 Now Available!

Revenera announced the new release of InstallShield 2022, with ability...
Read More
Yogosha | Bug Bounty: the differences between public and private platforms
Blog Yogosha Blog

Yogosha | Bug Bounty: the differences between public and private platforms

Originally published by Yogosha. Bug bounty programs have become a...
Read More
Reflectiz | reCAPTCHA Privacy — Is it an Oxymoron Now?
Blog Reflectiz Blog

Reflectiz | reCAPTCHA Privacy — Is it an Oxymoron Now?

Originally published by Reflectiz. Google’s reCAPTCHA, widely used on over...
Read More
Nagios XI 5.11 Is Here!
Blog Nagios Blog

Nagios XI 5.11 Is Here!

Originally published by Nagios. Here is the new release of...
Read More
Reflectiz | Web Exposure Management: Strengthening Security in the Modern Attack Surface
Blog Reflectiz Blog

Reflectiz | Web Exposure Management: Strengthening Security in the Modern Attack Surface

Originally published by Reflectiz. In the era of increasing web...
Read More
ImmuniWeb Wins the Highly Recommended Trophy at SC Awards Europe 2023!
Blog ImmuniWeb Blog

ImmuniWeb Wins the Highly Recommended Trophy at SC Awards Europe 2023!

Originally published by ImmuniWeb. We proudly announce that our partner,...
Read More
AdminStudio 2023 Now Available! | Flexera
Blog Flexera Blog

AdminStudio 2023 Now Available! | Flexera

Originally published by Flexera. Check out AdminStudio 2023 New Release,...
Read More
Acunetix sunsets support for Windows 8 and Server 2012
Acunetix Blog Blog

Acunetix sunsets support for Windows 8 and Server 2012

Originally published by Acunetix. Acunetix Premium releases update 15.7 for...
Read More
Yogosha | Paris Aéroport: Hackers to test airport equipment cybersecurity
Blog Yogosha Blog

Yogosha | Paris Aéroport: Hackers to test airport equipment cybersecurity

Originally published by Yogosha. Groupe ADP recently subjected its airport...
Read More
Invicti Security 2023 Rebranding to Deliver AppSec with Zero Noise | Invicti
Blog Invicti Blog

Invicti Security 2023 Rebranding to Deliver AppSec with Zero Noise | Invicti

Introducing the new Invicti Security™ corporate brand! Known for its...
Read More
ImmuniWeb Wins Gold Awards at Cybersecurity Excellence Awards 2023!
Blog ImmuniWeb Blog

ImmuniWeb Wins Gold Awards at Cybersecurity Excellence Awards 2023!

Originally published by ImmuniWeb. We proudly announce that our partner,...
Read More
New Release: Axidian Privilege 2.7
Axidian Blog Blog

New Release: Axidian Privilege 2.7

Originally published by Indeed ID. Indeed Identity has released a...
Read More
Unpacking the Cyber Threat Landscape in APAC: Insights from the Threat Intelligence Index
Blog LOGON Blog Threat Intelligence.

Unpacking the Cyber Threat Landscape in APAC: Insights from the Threat Intelligence Index

In recent years, Asia has become a hub for technology...
Read More
The Future of Report Generation with Blazor WebAssembly | Fast Reports
Blog FastReport Blog

The Future of Report Generation with Blazor WebAssembly | Fast Reports

Microsoft has a framework for creating interactive web interfaces with...
Read More
MDM for MSPs: The Ultimate Solution for Mobile Device Management | Prey Project
Blog Endpoint Security Blog Prey Project Blog

MDM for MSPs: The Ultimate Solution for Mobile Device Management | Prey Project

Originally published by Prey Project. Safeguard your data and maintain...
Read More
Data wiping for lost devices | Prey Project
Blog Prey Project Blog

Data wiping for lost devices | Prey Project

Originally published by Prey Project. Don't let your data fall...
Read More
How to optimize Prey for device tracking | Prey Project
Blog Prey Project Blog

How to optimize Prey for device tracking | Prey Project

Originally published by Prey Project. Prey is a powerful device-tracking...
Read More
Insider Threat Protection: Media, Entertainment and Broadcasting | Zecurion
Blog Data Loss Prevention Insider Threat Zecurion Blog

Insider Threat Protection: Media, Entertainment and Broadcasting | Zecurion

Originally published by Zecurion. New technologies and devices have made...
Read More
2FA Push Notifications with the UserLock Push App | IS Decisions
Blog ISDecision Blog UserLock

2FA Push Notifications with the UserLock Push App | IS Decisions

Originally published by IS Decisions. Get early access to 2FA...
Read More
Incident response plan 101: the basics | Prey Project
Blog Prey Project Blog

Incident response plan 101: the basics | Prey Project

Originally published by Prey Project. Learn the basics of incident...
Read More
Types of device tracking software: a complete guide | Prey Project
Blog Prey Project Blog

Types of device tracking software: a complete guide | Prey Project

Originally published by Prey Project. Learn the differences and nuances...
Read More
Threat Actors. Who is Attacking Us? | Bfore.AI
Bfore.AI Blog Blog Threat Intelligence.

Threat Actors. Who is Attacking Us? | Bfore.AI

Originally published by Bfore.AI. This article helps you understand the...
Read More
ImmuniWeb Wins Gold Awards at Cybersecurity Excellence Awards 2023!
Blog ImmuniWeb Blog

ImmuniWeb Wins Gold Awards at Cybersecurity Excellence Awards 2023!

Originally published by ImmuniWeb. We are proud to announce that...
Read More
New Magecart Attack Wears Google Tag Manager Disguise | Reflectiz
Blog Magecart & Web-Skimming Reflectiz Blog

New Magecart Attack Wears Google Tag Manager Disguise | Reflectiz

Originally published by Reflectiz. Magecart attacks have become increasingly common...
Read More
Acunetix releases a security check for Fortinet RCE flaw
Acunetix Blog Blog

Acunetix releases a security check for Fortinet RCE flaw

Originally published by Acunetix. This update from Acunetix aims to...
Read More
New Release of PRTG Version 23.1.82 | Paessler
Blog Paessler Blog

New Release of PRTG Version 23.1.82 | Paessler

Originally published by Paessler. The latest release of Paessler PRTG...
Read More
Introducing support for Real Android Devices on Playwright! | BrowserStack
Blog BrowserStack Blog

Introducing support for Real Android Devices on Playwright! | BrowserStack

Originally published by BrowserStack. We are excited to launch BrowserStack...
Read More
Why business-critical apps need DAST | Invicti
Blog Invicti Blog

Why business-critical apps need DAST | Invicti

Originally published by Invicti. Business-critical applications face various security threats...
Read More
Acunetix Premium Update for Windows and Linux: 15.4
Acunetix Blog Blog

Acunetix Premium Update for Windows and Linux: 15.4

Originally published by Acunetix. Server-side request forgery (SSRF) is the...
Read More
A guide to end to end encryption (e2ee) | RealVNC
Blog RealVNC Blog

A guide to end to end encryption (e2ee) | RealVNC

Originally published by RealVNC. We'll talk about the meaning of...
Read More
Open Source Software Risks: How to Identify and Remediate Vulnerabilities | Reflectiz
Attack Surface Blog Reflectiz Blog Third-Party Risk

Open Source Software Risks: How to Identify and Remediate Vulnerabilities | Reflectiz

Originally published by Reflectiz. Reflectiz will explore the nature of...
Read More
Password Recovery and Data Decryption: Getting Around and About | Elcomsoft
Blog Elcomsoft Blog

Password Recovery and Data Decryption: Getting Around and About | Elcomsoft

Originally published by Elcomsoft. Access to encrypted information can be...
Read More
Understanding the Motivations Driving Brand Attacks | Bfore.AI
Bfore.AI Blog Blog

Understanding the Motivations Driving Brand Attacks | Bfore.AI

Originally published by Bfore.AI. This article helps you understand the...
Read More
Reddit Systems Hacked by a Sophisticated and Highly-targeted Phishing Attack | FastPass
Blog FastPassCorp IVM Blog

Reddit Systems Hacked by a Sophisticated and Highly-targeted Phishing Attack | FastPass

Originally published by FastPassCorp. Hackers targeted Reddit employees with a...
Read More
Endpoint Management Should Not Be Complicated | Faronics
Blog Endpoint Security Blog Faronics Blog

Endpoint Management Should Not Be Complicated | Faronics

Originally published by Faronics. Here are 8 ways for IT...
Read More
What Is Mobile Device Management (MDM)? | Lansweeper
Blog Lansweeper Blog

What Is Mobile Device Management (MDM)? | Lansweeper

Originally published by Lansweeper. MDM, or Mobile Device Management, allows...
Read More
OSINT 101: Understanding OSINT, its tools, benefits and risks | Yogosha
Blog Yogosha Blog

OSINT 101: Understanding OSINT, its tools, benefits and risks | Yogosha

Originally published by Yogosha. OSINT is an essential part of...
Read More
VNC® Connect 7 is here! | RealVNC
Blog RealVNC Blog

VNC® Connect 7 is here! | RealVNC

Originally published by RealVNC. VNC Connect v. 7.0.0 is here,...
Read More
Brand Impersonated Search Engine Advertisements | Bfore.AI
Bfore.AI Blog Blog

Brand Impersonated Search Engine Advertisements | Bfore.AI

Originally published by Bfore.AI. Brand impersonation is often deployed by...
Read More
5 Best Practices for Healthcare CISOs to Secure PHI | Reflectiz
Blog Privacy Reflectiz Blog Security Compliance

5 Best Practices for Healthcare CISOs to Secure PHI | Reflectiz

Originally published by Reflectiz. The healthcare industry has increasingly come...
Read More
What is data exfiltration? | Acronis
Acronis Blog Blog Cyber Protect Cloud

What is data exfiltration? | Acronis

Originally published by Acronis. Data exfiltration, or data theft or...
Read More
What is end-to-end encryption (E2EE)? | Acronis
Acronis Blog Blog Cyber Protect Cloud

What is end-to-end encryption (E2EE)? | Acronis

Originally published by Acronis. End-to-end encryption (E2EE) secures messages —...
Read More
Tactics You Need to Know for Online Brand Protection | Bfore.AI
Bfore.AI Blog Blog

Tactics You Need to Know for Online Brand Protection | Bfore.AI

Originally published by Bfore.AI. With almost 90% of data breaches...
Read More
Communication Channels Mapping and Protection with Zecurion Traffic Control Module
Blog Data Loss Prevention Zecurion Blog

Communication Channels Mapping and Protection with Zecurion Traffic Control Module

Originally published by Zecurion. The article discusses the importance of...
Read More
2023.2 New Release: Improved ransomware protection | Emsisoft
Blog Emsisoft Blog

2023.2 New Release: Improved ransomware protection | Emsisoft

Originally published by Emsisoft. Emsisoft has fine-tuned its detection patterns...
Read More
January 2023 New Updates in Acronis Cyber Protect Cloud
Acronis Blog Blog Cyber Protect Cloud

January 2023 New Updates in Acronis Cyber Protect Cloud

Originally published by Acronis. In January 2023, Acronis continues to...
Read More
Job Recruitment Impersonation Scams | Bfore.AI
Bfore.AI Blog Blog

Job Recruitment Impersonation Scams | Bfore.AI

Originally published by Bfore.AI. While brand attacks intend to steal...
Read More
Brand Impersonation: Cyber Threats 101 | Bfore.AI
Bfore.AI Blog Blog

Brand Impersonation: Cyber Threats 101 | Bfore.AI

Originally published by Bfore.AI. Cyber attackers use impersonation attacks to...
Read More
Mailchimp breached twice by spear phishing against IT-department | FastPass
Blog FastPassCorp IVM Blog

Mailchimp breached twice by spear phishing against IT-department | FastPass

Originally published by FastPassCorp. Email marketing giant Mailchimp announced it...
Read More
Lansweeper’s 2023 Winter Release: ‘Chouffe’
Blog Lansweeper Blog

Lansweeper’s 2023 Winter Release: ‘Chouffe’

Originally published by Lansweeper. The Lansweeper's launch brings with it...
Read More
BrowserStack Wins TrustRadius Winter 2023 Best of Awards
Blog BrowserStack Blog

BrowserStack Wins TrustRadius Winter 2023 Best of Awards

Originally published by BrowserStack. We're excited to announce that BrowserStack...
Read More
Cloud vs Local Backup Comparison | Acronis
Acronis Blog Blog Cyber Protect Cloud

Cloud vs Local Backup Comparison | Acronis

Originally published by Acronis. This article will explore the positive...
Read More
Cloud File Sharing and Its Benefit | Acronis
Acronis Blog Blog Cyber Protect Cloud

Cloud File Sharing and Its Benefit | Acronis

Originally published by Acronis. To ensure security and information sharing,...
Read More
What is CTEM? A Complete Overview | Reflectiz
Attack Surface Blog Reflectiz Blog Third-Party Risk

What is CTEM? A Complete Overview | Reflectiz

Originally published by Reflectiz. Gartner coined the term Continuous Threat...
Read More
Web3, a strategic opportunity for decision makers and Tech leaders | Bfore.AI
Bfore.AI Blog Blog

Web3, a strategic opportunity for decision makers and Tech leaders | Bfore.AI

Originally published by Bfore.AI. Web3 is an ethos that has...
Read More
What is CMDB (Configuration Management Database)? | Lansweeper
Blog Lansweeper Blog

What is CMDB (Configuration Management Database)? | Lansweeper

Originally published by Lansweeper. A Configuration Management Database (CMDB) stores...
Read More
7 Required Steps to Secure Your iFrames Security | Reflectiz
Blog Client-side Protection Magecart & Web-Skimming Reflectiz Blog

7 Required Steps to Secure Your iFrames Security | Reflectiz

Originally published by Reflectiz. iFrames carry several security risks that...
Read More
2023.1 New Release: Scam protection | Emsisoft
Blog Emsisoft Blog

2023.1 New Release: Scam protection | Emsisoft

Originally published by Emsisoft. Emsisoft has teamed up with the...
Read More
UserLock: A Duo MFA Alternative | IS Decisions
Blog ISDecision Blog UserLock

UserLock: A Duo MFA Alternative | IS Decisions

Originally published by IS Decisions. We look at the two...
Read More
Introducing BrowserStack SDK!
Blog BrowserStack Blog

Introducing BrowserStack SDK!

Originally published by BrowserStack. We’re excited to announce the launch...
Read More
ImmuniWeb Discovery Becomes Available on Microsoft Azure Marketplace
Blog ImmuniWeb Blog

ImmuniWeb Discovery Becomes Available on Microsoft Azure Marketplace

Originally published by ImmuniWeb. ImmuniWeb Discovery has become available on...
Read More
5 Unexpected Ways to Reduce Your Attack Surface | Reflectiz
Attack Surface Blog Reflectiz Blog Third-Party Risk

5 Unexpected Ways to Reduce Your Attack Surface | Reflectiz

Originally published by Reflectiz. There are many actionable strategies to...
Read More
Zecurion Discovery Module: Keeping Data in Order
Blog Zecurion Blog

Zecurion Discovery Module: Keeping Data in Order

Originally published by Zecurion. Understanding what assets you have and...
Read More
What is the impact of the metaverse on companies? | Bfore.AI
Bfore.AI Blog Blog

What is the impact of the metaverse on companies? | Bfore.AI

Originally published by Bfore.AI. As digital technologies move into the...
Read More
6 Essentials for Foolproof Source Code Security | Reflectiz
Attack Surface Blog Reflectiz Blog Software Assurance

6 Essentials for Foolproof Source Code Security | Reflectiz

Originally published by Reflectiz. To prevent the consequences of weak...
Read More
Bfore.Ai named by Gartner in latest report
Bfore.AI Blog Blog

Bfore.Ai named by Gartner in latest report

Originally published by Bfore.AI. Being one of the fastest growing...
Read More
Invicti brings zero-noise application security into the AWS Marketplace
Blog Invicti Blog

Invicti brings zero-noise application security into the AWS Marketplace

Originally published by Invicti. Invicti now offers its industry-leading DAST...
Read More
The Two and a Half Years See Tickets Web-Skimming Attack Didn’t Need to Happen! | Reflectiz
Blog Reflectiz Blog

The Two and a Half Years See Tickets Web-Skimming Attack Didn’t Need to Happen! | Reflectiz

Originally published by Reflectiz. All online retailers are like honeypots...
Read More
2022.12 New Release: Maintenance release | Emsisoft
Blog Emsisoft Blog

2022.12 New Release: Maintenance release | Emsisoft

Originally published by Emsisoft. Emsisoft shared that their update includes...
Read More
ImmuniWeb Launches Phishing Websites Takedown Service
Blog ImmuniWeb Blog

ImmuniWeb Launches Phishing Websites Takedown Service

Originally published by ImmuniWeb. The new service allows ImmuniWeb customers...
Read More
What is Mastodon and is it secure? | Emsisoft
Blog Emsisoft Blog

What is Mastodon and is it secure? | Emsisoft

Originally published by Emsisoft. A new global Incidents panel that...
Read More
Approaching iOS Extractions: Choosing the Right Acquisition Method | Elcomsoft
Blog Elcomsoft Blog

Approaching iOS Extractions: Choosing the Right Acquisition Method | Elcomsoft

Originally published by Elcomsoft. The extraction method or methods available...
Read More
Qatar World Cup 2022 : A threat for football fans | Bfore.AI
Bfore.AI Blog Blog

Qatar World Cup 2022 : A threat for football fans | Bfore.AI

Originally published by Bfore.AI. During World Cup, Attackers are likely...
Read More
ECRI Warns Healthcare Providers About Third-Party Tags Like Meta Pixel | Reflectiz
Blog Reflectiz Blog

ECRI Warns Healthcare Providers About Third-Party Tags Like Meta Pixel | Reflectiz

Originally published by Reflectiz. About a third of the top...
Read More
Rapidly launch data loss prevention services in Acronis Cyber Protect Cloud with Advanced DLP | Acronis
Acronis Blog Blog Cyber Protect Cloud

Rapidly launch data loss prevention services in Acronis Cyber Protect Cloud with Advanced DLP | Acronis

Originally published by Acronis. This article discusses cyber threat intelligence,...
Read More
Cloud Forensics: Obtaining iCloud Backups, Media Files and Synchronized Data | Elcomsoft
Blog Elcomsoft Blog

Cloud Forensics: Obtaining iCloud Backups, Media Files and Synchronized Data | Elcomsoft

Originally published by Elcomsoft. Apple iCloud can store cloud backups...
Read More
What Can We Learn from the Famous Macy’s Magecart Cyberattack? | Reflectiz
Blog Reflectiz Blog

What Can We Learn from the Famous Macy’s Magecart Cyberattack? | Reflectiz

Originally published by Reflectiz. The Macy’s Magecart attack was the...
Read More
Screen Watermarks and Screen Photo Detector | Zecurion
Blog Zecurion Blog

Screen Watermarks and Screen Photo Detector | Zecurion

Originally published by Zecurion. Suppose an employee tries to send...
Read More
Cyber Threat Intelligence and Monitoring | Acronis
Acronis Blog Blog Cyber Protect Cloud

Cyber Threat Intelligence and Monitoring | Acronis

Originally published by Acronis. This article discusses cyber threat intelligence,...
Read More
This is How You Can Spot Fake Domains | Bfore.AI
Bfore.AI Blog Blog

This is How You Can Spot Fake Domains | Bfore.AI

Originally published by Bfore.AI. During World Cup, Have you ever...
Read More
Using Flame Graphs When Profiling Java Applications | ej Technologies
Blog ej Technologies Blog JProfiler

Using Flame Graphs When Profiling Java Applications | ej Technologies

Originally published by ej Technologies. Flame graphs are a great...
Read More
Overcoming MSP tool sprawl: The magic of integrated tools | Acronis
Acronis Blog Blog Cyber Protect Cloud Endpoint Security Blog

Overcoming MSP tool sprawl: The magic of integrated tools | Acronis

Originally published by Acronis. Acronis Cyber Protect Cloud, the one...
Read More
New in 2022.11: Introducing the new global Incidents panel | Emsisoft
Blog Emsisoft Blog

New in 2022.11: Introducing the new global Incidents panel | Emsisoft

Originally published by Emsisoft. A new global Incidents panel that...
Read More
50% of Data Breaches can be Attributed to Leaked Credentials | FastPass
Blog FastPassCorp IVM Blog

50% of Data Breaches can be Attributed to Leaked Credentials | FastPass

Originally published by FastPassCorp. Hacking an IT system is often...
Read More
Profiling A Netty Server | ej Technologies
Blog ej Technologies Blog JProfiler

Profiling A Netty Server | ej Technologies

Originally published by ej Technologies. JProfiler’s support for Netty covers...
Read More
Soft Management: How to Boost Employee Productivity with Zecurion Staff Control Module
Blog EAM Blog Zecurion Blog

Soft Management: How to Boost Employee Productivity with Zecurion Staff Control Module

Originally published by Zecurion. Nowadays, the only limitation you have...
Read More
Eight Ways to Cut IT Costs | Faronics
Blog Faronics Blog

Eight Ways to Cut IT Costs | Faronics

Originally published by Faronics. Here are 8 ways for IT...
Read More
How Application Security Should Work For Modern Cloud Environments | Cloudnosys
Blog Cloudnosys Blog

How Application Security Should Work For Modern Cloud Environments | Cloudnosys

Originally published by Cloudnosys. Failure to adequately protect your organization's...
Read More
What is Software Security Assurance and Why You Should Care | Reflectiz
Blog Reflectiz Blog

What is Software Security Assurance and Why You Should Care | Reflectiz

Originally published by Reflectiz. Weak software security can bring critical...
Read More
40% of Australians Have Had Personal Data Stolen in the Optus Massive Data Breach | Reflectiz
Blog Reflectiz Blog

40% of Australians Have Had Personal Data Stolen in the Optus Massive Data Breach | Reflectiz

Originally published by Reflectiz. The Macy’s Magecart attack was the...
Read More
MFA Fatigue: Passwords are still important | FastPass
Blog FastPassCorp IVM Blog

MFA Fatigue: Passwords are still important | FastPass

Originally published by FastPassCorp. Have you heard of “MFA Fatigue”?...
Read More
Vishing cases have increased almost 550%! | FastPass
Blog FastPassCorp IVM Blog

Vishing cases have increased almost 550%! | FastPass

Originally published by FastPassCorp. Vishing (voice phishing) cases have increased...
Read More
Vulnerabilities In Cloud Infrastructure Leading To Ransomware | Cloudnosys
Blog Cloudnosys Blog

Vulnerabilities In Cloud Infrastructure Leading To Ransomware | Cloudnosys

Originally published by Cloudnosys. Ransomware knows no boundaries. Companies are...
Read More
Top 5 Most Common Web Threats for Black Friday 2022 | Reflectiz
Blog Reflectiz Blog

Top 5 Most Common Web Threats for Black Friday 2022 | Reflectiz

Originally published by Reflectiz. During Black Friday 2021, 88 million...
Read More
Inlining Asynchronous Executions in JProfiler’s Call Tree | ej Technologies
Blog ej Technologies Blog JProfiler

Inlining Asynchronous Executions in JProfiler’s Call Tree | ej Technologies

Originally published by ej Technologies. This screencast shows how to...
Read More
Security Trends That Would Shape the Year 2022 | Cloudnosys
Blog Cloudnosys Blog

Security Trends That Would Shape the Year 2022 | Cloudnosys

Originally published by Cloudnosys. Cybercriminals will continue to target cloud...
Read More
Infostealers: What they are, how they spread and how to stop them | Emsisoft
Blog Emsisoft Blog

Infostealers: What they are, how they spread and how to stop them | Emsisoft

Originally published by Emsisoft. An infostealer is a type of...
Read More
New in 2022.10: Incidents handling enhancements | Emsisoft
Blog Emsisoft Blog

New in 2022.10: Incidents handling enhancements | Emsisoft

Originally published by Emsisoft. We just made dealing with malware...
Read More
69% of IT Departments have been Targeted by Vishing Attacks | FastPass
Blog FastPassCorp IVM Blog

69% of IT Departments have been Targeted by Vishing Attacks | FastPass

Originally published by FastPassCorp. Are IT departments victims of social...
Read More
LOGON at CyberSecurity World Asia
Blog

LOGON at CyberSecurity World Asia

Join LOGON at Cybersecurity World Asia 2022 in Singapore TechWeek,...
Read More
Version of Stimulsoft Reports and Dashboards 2022.4 is already here!
Blog Stimulsoft Blog

Version of Stimulsoft Reports and Dashboards 2022.4 is already here!

There is a new release of Stimulsoft Reports and Dashboards...
Read More
What’s new in Acronis Cyber Protect Cloud? — September 2022
Acronis Blog Blog Cyber Protect Cloud

What’s new in Acronis Cyber Protect Cloud? — September 2022

Originally published by Acronis. Acronis Cyber Protect Cloud enables you...
Read More
iOS Forensic Toolkit 8.0 Now Official: Bootloader-Level Extraction for 76 Devices | Elcomsoft
Blog Elcomsoft Blog

iOS Forensic Toolkit 8.0 Now Official: Bootloader-Level Extraction for 76 Devices | Elcomsoft

Originally published by Elcomsoft. iOS Forensic Toolkit 8.0 is officially...
Read More
A Guide to Choosing A Unified Endpoint Management Solution | Faronics
Blog Endpoint Security Blog Faronics Blog

A Guide to Choosing A Unified Endpoint Management Solution | Faronics

Originally published by Faronics. By employing endpoint management solutions to...
Read More
Introducing Percy Visual Engine: A generational leap in image comparisons | BrowserStack
Blog BrowserStack Blog

Introducing Percy Visual Engine: A generational leap in image comparisons | BrowserStack

Originally published by BrowserStack. Introducing a ground-up rebuild of how...
Read More
Profiling HTTP Calls and Tracking Them Between JVMs | ej Technologies
Blog ej Technologies Blog JProfiler

Profiling HTTP Calls and Tracking Them Between JVMs | ej Technologies

Originally published by ej Technologies. This screen cast shows how...
Read More
How to create an incident response plan: A guide for MSPs | Emsisoft
Blog Emsisoft Blog

How to create an incident response plan: A guide for MSPs | Emsisoft

Originally published by Emsisoft. When dealing with a cyber attack,...
Read More
Set Alerts to File Access or Access Attempt | FileAudit
Blog FileAudit ISDecision Blog

Set Alerts to File Access or Access Attempt | FileAudit

Get notified for any chosen access event. FileAudit provides automated...
Read More
How to See Who Last Accessed or Last Modified your Windows Files | FileAudit
Blog FileAudit ISDecision Blog

How to See Who Last Accessed or Last Modified your Windows Files | FileAudit

As an important security and compliance measure, watch how you...
Read More
How to Clean the File Access Events in your Database | FileAudit
Blog FileAudit ISDecision Blog

How to Clean the File Access Events in your Database | FileAudit

The event cleaner in FileAudit allows you to delete historic...
Read More
Deploy Zero Trust and XDR to fight ransomware! | Bfore.AI
Bfore.AI Blog Blog

Deploy Zero Trust and XDR to fight ransomware! | Bfore.AI

Originally published by Bfore.AI. Ransomware cyber-attacks have continued to make...
Read More
How Social Engineering Attacks breach GDPR | FastPass
Blog FastPassCorp IVM Blog

How Social Engineering Attacks breach GDPR | FastPass

Originally published by FastPassCorp. Social Engineering in a data breach...
Read More
Image as dashboard element | Stimulsoft
Blog Stimulsoft Blog

Image as dashboard element | Stimulsoft

Stimulsoft will share in this article about the Image element of Stimulsoft.
Read More
What is EDR? | Emsisoft
Blog Emsisoft Blog Endpoint Security Blog

What is EDR? | Emsisoft

Originally published by Emsisoft. EDR tools can help organizations gain...
Read More
The PDF417 barcode in Stimulsoft reports
Blog Stimulsoft Blog

The PDF417 barcode in Stimulsoft reports

In this article focusing on barcodes in Stimulsoft Designer, you...
Read More
New in 2022.9: Enhanced incidents management to improve EDR workflows | Emsisoft
Blog Emsisoft Blog

New in 2022.9: Enhanced incidents management to improve EDR workflows | Emsisoft

Originally published by Emsisoft. This update sees enhancements to our...
Read More
Zero Trust or Trust No One? | Bfore.AI
Bfore.AI Blog Blog

Zero Trust or Trust No One? | Bfore.AI

Originally published by Bfore.AI. Zero Trust is not a product....
Read More
New features of the Pivot Table | Stimulsoft
Blog Stimulsoft Blog

New features of the Pivot Table | Stimulsoft

In this article, you will learn about the Pivot Table...
Read More
Elcomsoft iOS Forensic Toolkit 7.60 extends agent-based full file system extraction
Blog Elcomsoft Blog

Elcomsoft iOS Forensic Toolkit 7.60 extends agent-based full file system extraction

Originally published by Elcomsoft. Elcomsoft iOS Forensic Toolkit 7.60 extends...
Read More
What’s new in Acronis Cyber Protect Cloud? — August 2022
Acronis Blog Blog Cyber Protect Cloud

What’s new in Acronis Cyber Protect Cloud? — August 2022

Acronis is committed to making it easy for MSPs to...
Read More
Support for M series chips in the report designer for macOS | Stimulsoft
Blog Stimulsoft Blog

Support for M series chips in the report designer for macOS | Stimulsoft

Starting with version 2022.3, the Stimulsoft report designer for macOS...
Read More
Low-Level Extraction of iOS 15.2-15.3.1 | Elcomsoft
Blog Elcomsoft Blog

Low-Level Extraction of iOS 15.2-15.3.1 | Elcomsoft

Originally published by Elcomsoft. iOS Forensic Toolkit 7.60 brings gapless...
Read More
Region map in dashboards | Stimulsoft
Blog Stimulsoft Blog

Region map in dashboards | Stimulsoft

In the series of articles about the report designer and...
Read More
How can digital technology help address environmental, social and governance (ESG) issues? | Bfore.AI
Bfore.AI Blog Blog

How can digital technology help address environmental, social and governance (ESG) issues? | Bfore.AI

Originally published by Bfore.AI. Achieving ESG goals and making sustainability...
Read More
Using a Stored Procedure in the design of reports | Stimulsoft
Blog Stimulsoft Blog

Using a Stored Procedure in the design of reports | Stimulsoft

One of the new features of the 2022.3 Stimulsoft release...
Read More
Breaking Windows Passwords: LM, NTLM, DCC and Windows Hello PIN Compared | Elcomsoft
Blog Elcomsoft Blog

Breaking Windows Passwords: LM, NTLM, DCC and Windows Hello PIN Compared | Elcomsoft

Originally published by Elcomsoft. Modern versions of Windows have many...
Read More
New features for the Tooltip | Stimulsoft
Blog Stimulsoft Blog

New features for the Tooltip | Stimulsoft

One of the new features of the 2022.3 Stimulsoft release...
Read More
Acronis Cyber Protect stopped all the threats in the Advanced Protection Test commissioned by AV-Test.org
Acronis Blog Blog Cyber Protect Cloud

Acronis Cyber Protect stopped all the threats in the Advanced Protection Test commissioned by AV-Test.org

Originally published by Acronis. For Acronis Cyber Protect, 8 out...
Read More
Working with Merged Reference Trees in JProfiler | ej Technologies
Blog ej Technologies Blog JProfiler

Working with Merged Reference Trees in JProfiler | ej Technologies

Originally published by ej Technologies. This screen cast shows how...
Read More
What is the potential of artificial intelligence to improve cybersecurity posture? | Bfore.AI
Bfore.AI Blog Blog

What is the potential of artificial intelligence to improve cybersecurity posture? | Bfore.AI

Originally published by Bfore.AI. Security professionals need strong support from...
Read More
Top 5 Most Common API Vulnerabilities You Should Know About | Reflectiz
Blog Reflectiz Blog

Top 5 Most Common API Vulnerabilities You Should Know About | Reflectiz

Originally published by Reflectiz. Much of the effort to secure...
Read More
The SolarWinds Supply Chain Attack: Implementing a Layered Security Approach | Reflectiz
Blog Reflectiz Blog

The SolarWinds Supply Chain Attack: Implementing a Layered Security Approach | Reflectiz

Originally published by Reflectiz. The recently exposed SolarWinds supply chain...
Read More
How to Configure a Script Probe in JProfiler | ej Technologies
Blog ej Technologies Blog JProfiler

How to Configure a Script Probe in JProfiler | ej Technologies

Originally published by ej Technologies. This screen cast shows how...
Read More
Lansweeper’s 2022 Summer Release: ‘Bacchus’
Blog Lansweeper Blog

Lansweeper’s 2022 Summer Release: ‘Bacchus’

Originally published by Lansweeper. Lansweeper's latest 2022 Summer Launch explores...
Read More
New Release: install4j 10.0 | ej Technologies
Blog ej Technologies Blog install4j

New Release: install4j 10.0 | ej Technologies

Originally published by ej Technologies. install4j now supports Windows on...
Read More
checkm8 Extraction: iPhone 7 | Elcomsoft
Blog Elcomsoft Blog

checkm8 Extraction: iPhone 7 | Elcomsoft

Originally published by Elcomsoft. iOS Forensic Toolkit 7.60 brings gapless...
Read More
Migrating to install4j 10.0 | ej Technologies
Blog ej Technologies Blog install4j

Migrating to install4j 10.0 | ej Technologies

Originally published by ej Technologies. This screen cast shows how...
Read More
[SCAM ALERT 035] -AmericaFirst  | Bfore.AI
Bfore.AI Blog Blog

[SCAM ALERT 035] -AmericaFirst | Bfore.AI

Originally published by Bfore.AI. During Bfore.AI PreCrime internet scout of...
Read More
Apple TV 4K Keychain and Full File System Acquisition | Elcomsoft
Blog Elcomsoft Blog

Apple TV 4K Keychain and Full File System Acquisition | Elcomsoft

Originally published by Elcomsoft. Mobile forensics is not limited to...
Read More
Managing cyber risks related to remote working  | Bfore.AI
Bfore.AI Blog Blog

Managing cyber risks related to remote working | Bfore.AI

Originally published by Bfore.AI. By implementing a number of practical...
Read More
Building an Efficient Password Recovery Workstation: Power Savings and Waste Heat Management | Elcomsoft
Blog Elcomsoft Blog

Building an Efficient Password Recovery Workstation: Power Savings and Waste Heat Management | Elcomsoft

Originally published by Elcomsoft. This article continues the series of...
Read More
3 ways to stimulate and reinvent effective risk management in the face of uncertainty | Bfore.AI
Bfore.AI Blog Blog

3 ways to stimulate and reinvent effective risk management in the face of uncertainty | Bfore.AI

Originally published by Bfore.AI. The impact of the coronavirus pandemic...
Read More
InstallShield 2022 Now Available!
Blog InstallShield Blog Revenera Blog

InstallShield 2022 Now Available!

Revenera announced the new release of InstallShield 2022, with ability...
Read More
Crisis management is at the heart of ransomware resilience | Bfore.AI
Bfore.AI Blog Blog

Crisis management is at the heart of ransomware resilience | Bfore.AI

Originally published by Bfore.AI. Business leaders can recover from attacks...
Read More
Exciting new features available in Acronis Cyber Protect Cloud 22.06
Acronis Blog Blog Cyber Protect Cloud

Exciting new features available in Acronis Cyber Protect Cloud 22.06

This June release of Acronis Cyber Protect Cloud not only...
Read More
What is Remote Code Execution (RCE)? | Lansweeper
Blog Lansweeper Blog

What is Remote Code Execution (RCE)? | Lansweeper

Originally published by Lansweeper. Remote code execution or RCE, also...
Read More
How To Reduce Your Risk Of Getting Hacked | Faronics
Blog Faronics Blog

How To Reduce Your Risk Of Getting Hacked | Faronics

Originally published by Faronics. A cyber attack is tough to...
Read More
How to limit the risks related to cyber attacks on the supply chain? | Bfore.AI
Bfore.AI Blog Blog

How to limit the risks related to cyber attacks on the supply chain? | Bfore.AI

Originally published by Bfore.AI. CISOs and CIOs are aware of...
Read More
“Zero Trust” and “Cybersecurity Mesh” : the enemy can be anywhere | Bfore.AI
Bfore.AI Blog Blog

“Zero Trust” and “Cybersecurity Mesh” : the enemy can be anywhere | Bfore.AI

Originally published by Bfore.AI. The "Zero Trust" model has evolved...
Read More
The evolution of the concept of “Defense in Depth” in the age of the cloud and digitalization | Bfore.AI
Bfore.AI Blog Blog

The evolution of the concept of “Defense in Depth” in the age of the cloud and digitalization | Bfore.AI

Originally published by Bfore.AI. At a time of increasing hybridization...
Read More
What is a Zero-day Vulnerability? | Lansweeper
Blog Lansweeper Blog

What is a Zero-day Vulnerability? | Lansweeper

Originally published by Lansweeper. A zero-day vulnerability is a flaw...
Read More
What’s next for AI? | Bfore.AI
Bfore.AI Blog Blog

What’s next for AI? | Bfore.AI

Originally published by Bfore.AI. AI can't replace security professionals, but...
Read More
AI defense against today’s cyber threats | Bfore.AI
Bfore.AI Blog Blog

AI defense against today’s cyber threats | Bfore.AI

Originally published by Bfore.AI. We will discuss how the expansion...
Read More
Simplify MFA & Session Management With the New, Intuitive UserLock Web App | IS Decisions
Blog ISDecision Blog UserLock

Simplify MFA & Session Management With the New, Intuitive UserLock Web App | IS Decisions

Originally published by IS Decisions. The UserLock Web App allows...
Read More
Expanding enterprise attack surface | Bfore.AI
Bfore.AI Blog Blog

Expanding enterprise attack surface | Bfore.AI

Originally published by Bfore.AI. The adoption of 5G networks and...
Read More
AdminStudio 2022 is Here! | Flexera
Blog Flexera Blog

AdminStudio 2022 is Here! | Flexera

Originally published by Flexera. We are excited to announce the...
Read More
Lansweeper’s 2022 Spring Launch: ‘Aymon’
Blog Lansweeper Blog

Lansweeper’s 2022 Spring Launch: ‘Aymon’

Originally published by Lansweeper. Lansweeper's latest 2022 Spring Launch delivers...
Read More
The Essential Guide to Preventing JavaScript Injection | Reflectiz
Blog Reflectiz Blog

The Essential Guide to Preventing JavaScript Injection | Reflectiz

Originally published by Reflectiz. Third-party vendors who access your sites...
Read More
A Step-by-step Guide to Preventing Formjacking Attacks | Reflectiz
Blog Reflectiz Blog

A Step-by-step Guide to Preventing Formjacking Attacks | Reflectiz

Originally published by Reflectiz. Here are some actionable, recommended steps...
Read More
How to protect the network from insider threats | Emsisoft
Blog Emsisoft Blog

How to protect the network from insider threats | Emsisoft

Originally published by Emsisoft. Ransomware groups are using insiders to...
Read More
9 Website Security Risks and Why You Need to Guard Against Them | Nagios
Blog Nagios Blog

9 Website Security Risks and Why You Need to Guard Against Them | Nagios

Originally published by Nagios. Your website is a vital hub...
Read More
PCI-DSS Got an Update – What Does Version 4.0 Mean for Your Compliance Requirements? | Reflectiz
Blog Reflectiz Blog

PCI-DSS Got an Update – What Does Version 4.0 Mean for Your Compliance Requirements? | Reflectiz

Originally published by Reflectiz. PCI-DSS is going through some changes!...
Read More
Burp Scanner can now crawl static sites between 6x – 9x faster | PortSwigger
Blog Portswigger Blog

Burp Scanner can now crawl static sites between 6x – 9x faster | PortSwigger

Originally published by PortSwigger. Burp Suite Professional version 2022.2.3 made...
Read More
Why WAF and Firewall Solutions Will Not Help Against Third-Party Website Attacks | Reflectiz
Blog Reflectiz Blog

Why WAF and Firewall Solutions Will Not Help Against Third-Party Website Attacks | Reflectiz

Originally published by Reflectiz. This article will walk you through...
Read More
New in 2022.4: Endpoint Detection and Response Beta with deep threat insights | Emsisoft
Blog Emsisoft Blog Endpoint Security Blog

New in 2022.4: Endpoint Detection and Response Beta with deep threat insights | Emsisoft

Originally published by Emsisoft. A major improvement of our EDR...
Read More
Cyber-Attacks, Vulnerabilities and How Patch Management Can Help You | Faronics
Blog Faronics Blog

Cyber-Attacks, Vulnerabilities and How Patch Management Can Help You | Faronics

Originally published by Faronics. What would happen if a hacker...
Read More
8 Best Content Security Policies for 2022 | Reflectiz
Blog Reflectiz Blog

8 Best Content Security Policies for 2022 | Reflectiz

Originally published by Reflectiz. Content Security Policies can vary, and...
Read More
New in 2022.2: Improved user experience | Emsisoft
Blog Emsisoft Blog

New in 2022.2: Improved user experience | Emsisoft

Originally published by Emsisoft. Emsisoft Anti-Malware awarded VB100 in March...
Read More
HaloITSM awarded with 6 badges for G2 Spring 2022
Blog HaloITSM Blog

HaloITSM awarded with 6 badges for G2 Spring 2022

Based on thousands of reviews within the IT Service Management...
Read More
Stimulsoft Reports and Dashboards. New version 2022.2 released
Blog Stimulsoft Blog

Stimulsoft Reports and Dashboards. New version 2022.2 released

Stimulsoft have added new elements in their new release, extended...
Read More
Ways to protect the password before the user receives their first password | FastPassCorp
Blog FastPassCorp SSPR Blog

Ways to protect the password before the user receives their first password | FastPassCorp

Originally published by FastPassCorp. Nobody wants a user’s password to...
Read More
Data Classification as Data Loss Prevention Necessity | Zecurion
Blog Zecurion Blog

Data Classification as Data Loss Prevention Necessity | Zecurion

Originally published by Zecurion. Businesses have more data than ever...
Read More
Meet Salesforce MFA Requirements via SSO With Active Directory Identities | IS Decisions
Blog ISDecision Blog UserLock

Meet Salesforce MFA Requirements via SSO With Active Directory Identities | IS Decisions

Originally published by IS Decisions. This article explains how UserLock...
Read More
Master Your Data Lifecycle to Improve Data Security | IS Decisions
Blog ISDecision Blog UserLock

Master Your Data Lifecycle to Improve Data Security | IS Decisions

Originally published by IS Decisions. A data lifecycle is hard...
Read More
DAST, IAST, SCA: Deeper coverage in a single scan | Invicti
Acunetix Blog Blog Invicti Blog

DAST, IAST, SCA: Deeper coverage in a single scan | Invicti

Originally published by Invicti. With Invicti SCA as part of...
Read More
Back At Home? Top Tips For Remote Endpoint Management | Faronics
Blog Endpoint Security Blog Faronics Blog

Back At Home? Top Tips For Remote Endpoint Management | Faronics

Originally published by Faronics. Endpoint management has become more complicated...
Read More
Secure SSO for Cloud Access Using Existing On-Premise Active Directory Identities | IS Decisions
Blog ISDecision Blog UserLock

Secure SSO for Cloud Access Using Existing On-Premise Active Directory Identities | IS Decisions

Originally published by IS Decisions. The new release of UserLock...
Read More
What’s New for UserLock 11 | IS Decisions
Blog ISDecision Blog UserLock

What’s New for UserLock 11 | IS Decisions

Originally published by IS Decisions. UserLock is the go-to access...
Read More
Apple Mobile Devices and iOS Acquisition Methods | Elcomsoft
Blog Elcomsoft Blog

Apple Mobile Devices and iOS Acquisition Methods | Elcomsoft

Originally published by Elcomsoft. Along with the version of iOS/watchOS/iPadOS,...
Read More
How to use Azure AD single sign-on to log in to PRTG | Paessler
Blog Paessler Blog

How to use Azure AD single sign-on to log in to PRTG | Paessler

Originally published by Paessler. One of the most-anticipated features was...
Read More
What is server-side request forgery (SSRF)? | Acunetix
Acunetix Blog Blog

What is server-side request forgery (SSRF)? | Acunetix

Originally published by Acunetix. Server-side request forgery (SSRF) is the...
Read More
PRTG v. 22.1.74 comes with 3 beta sensors and security improvements | Paessler
Blog Paessler Blog

PRTG v. 22.1.74 comes with 3 beta sensors and security improvements | Paessler

Originally published by Paessler. The first release of PRTG Network...
Read More
New in 2022.2: Improved user experience | Emsisoft
Blog Emsisoft Blog

New in 2022.2: Improved user experience | Emsisoft

Originally published by Emsisoft. Emsisoft made a series of smaller...
Read More
Why Monitoring Your Network Monitor is the Fail-Safe You Didn’t Know You Need | Nagios
Blog Nagios Blog

Why Monitoring Your Network Monitor is the Fail-Safe You Didn’t Know You Need | Nagios

Originally published by Nagios. Nagios addressed the items that should...
Read More
What Makes A Good IT Ticket Management System? | Faronics
Blog Faronics Blog

What Makes A Good IT Ticket Management System? | Faronics

Originally published by Faronics. The reasons why helpdesks came into...
Read More
FastPass IVM certified for ServiceNow Store
Blog FastPassCorp IVM Blog

FastPass IVM certified for ServiceNow Store

Originally published by FastPassCorp. ServiceNow customers now can find information...
Read More
Is the reactiveness of your security system enough?  | Bfore.AI
Bfore.AI Blog Blog

Is the reactiveness of your security system enough? | Bfore.AI

Originally published by Bfore.AI. Anti-virus & anti-malware vendors preach about...
Read More
Next Generation DLP for Forensic Investigations | Zecurion
Blog Zecurion Blog

Next Generation DLP for Forensic Investigations | Zecurion

Originally published by Zecurion. The required tasks of the DLP,...
Read More
Agent-based full file system and keychain extraction: now up to iOS 14.8 | Elcomsoft
Blog Elcomsoft Blog

Agent-based full file system and keychain extraction: now up to iOS 14.8 | Elcomsoft

Originally published by Elcomsoft. iOS Forensic Toolkit 7.10 brings low-level...
Read More
Y2K22 Exchange Bug Cripples Emails | Lansweeper
Blog Lansweeper Blog

Y2K22 Exchange Bug Cripples Emails | Lansweeper

Microsoft was undoubtedly the first to surprise everyone in the...
Read More
New in 2022.1: Improved user interfaces on desktop and in web app | Emsisoft
Blog Emsisoft Blog

New in 2022.1: Improved user interfaces on desktop and in web app | Emsisoft

In Emsisoft first update of 2022, there will be a...
Read More
Infiltrating Internal Networks with Log4Shell | Reflectiz
Blog Reflectiz Blog

Infiltrating Internal Networks with Log4Shell | Reflectiz

Reflectiz begins to grasp the scope of events that followed...
Read More
Why Using SMS Authentication for 2FA Is Not Secure | IS Decisions
Blog ISDecision Blog UserLock

Why Using SMS Authentication for 2FA Is Not Secure | IS Decisions

SMS two-factor authentication is one of the most widespread types...
Read More
Gartner Report Takes a New Look At Vulnerability Management | ArcusTeam
Blog DeviceTotal Blog

Gartner Report Takes a New Look At Vulnerability Management | ArcusTeam

IoT devices are making their way into every facet of...
Read More
The Log4J Vulnerability in Bing Domain | Reflectiz
Blog Reflectiz Blog

The Log4J Vulnerability in Bing Domain | Reflectiz

Reflectiz platform detected a Log4J vulnerability in a domain owned...
Read More
December Major Update of ImmuniWeb Discovery
Blog ImmuniWeb Blog

December Major Update of ImmuniWeb Discovery

ImmuniWeb®  new free cloud security test enables cybersecurity and IT professionals to...
Read More
Scanning for the Log4J In Your Digital Vendors | Reflectiz
Blog Reflectiz Blog

Scanning for the Log4J In Your Digital Vendors | Reflectiz

Reports published on the 9 December 2021 have it that...
Read More
New version of FastReport Mono 2022.1 | Fast Reports
Blog FastReport Blog

New version of FastReport Mono 2022.1 | Fast Reports

The release of version 2022.1 in FastReport Mono took place....
Read More
New version of FastReport .NET 2022.1 | Fast Reports
Blog FastReport Blog

New version of FastReport .NET 2022.1 | Fast Reports

The release of version 2022.1 in FastReport .NET took place....
Read More
PRTG v. 21.4.73 comes with a new user interface, API and a new probe | Paessler
Blog Paessler Blog

PRTG v. 21.4.73 comes with a new user interface, API and a new probe | Paessler

The release of PRTG Network Monitor version 21.4.73 has been...
Read More
How to get monitoring data from REST interfaces | Paessler
Blog Paessler Blog

How to get monitoring data from REST interfaces | Paessler

Originally published by Paessler: Everything from gateways and firewalls through...
Read More
Real-Time Surveillance via Apple iCloud | Elcomsoft
Blog Elcomsoft Blog

Real-Time Surveillance via Apple iCloud | Elcomsoft

Originally published by Elcomsoft: Is surveillance a good or a...
Read More
Building a secure SDLC for web applications | Netsparker
Blog Notifications

Building a secure SDLC for web applications | Netsparker

A predictable and efficient software development lifecycle (SDLC) is crucial...
Read More
Active Scanning: Detailed Asset Data in Seconds | Lansweeper
Blog Endpoint Security Blog Lansweeper Blog

Active Scanning: Detailed Asset Data in Seconds | Lansweeper

Active scanning is a scanning method whereby you scan individual...
Read More
What is website security – how to protect your website from hacking | Acunetix
Acunetix Blog Blog

What is website security – how to protect your website from hacking | Acunetix

What is website security? How to protect your website? It...
Read More
The secret to getting results, not noise, from your DAST solution | Netsparker
Blog Invicti Blog

The secret to getting results, not noise, from your DAST solution | Netsparker

A low-quality tool that merely ticks a box will do...
Read More
The CDNjs’ Remote Control Execution | Reflectiz
Notifications Reflectiz Blog

The CDNjs’ Remote Control Execution | Reflectiz

Imagine that you’re a threat actor. You’re looking for a...
Read More
How to Assure The Security of Cloud Technologies | Falcongaze
Blog Falcongaze Blog

How to Assure The Security of Cloud Technologies | Falcongaze

Learn from Falcongaze article on how to assure the security...
Read More
СyberSecurity and the Healthcare | Falcongaze
Blog Falcongaze Blog

СyberSecurity and the Healthcare | Falcongaze

The Healthcare industry has featured in the top 5 industries...
Read More
How much of your channel process can you really “get away with” automating?  | Channelyze
Blog Channelyze Blog

How much of your channel process can you really “get away with” automating? | Channelyze

Originally published by Channelyze. With the entire world trying to...
Read More
Robinhood data breach – What was leaked? | FastPassCorp
Blog FastPassCorp IVM Blog

Robinhood data breach – What was leaked? | FastPassCorp

A hacker attack on the service desk happened for Robinhood....
Read More
Vital Tips to Help You Create a Secure React Web Application | GrapeCity
GrapeCity Blog Notifications

Vital Tips to Help You Create a Secure React Web Application | GrapeCity

In this article, you will learn about four methods that...
Read More
How to use screen recording in VNC Connect | RealVNC
Notifications RealVNC Blog

How to use screen recording in VNC Connect | RealVNC

On RealVNC's latest update, screen recording is now part of...
Read More
Onboarding your first distributor – A recipe for success  | Channelyze
Blog Channelyze Blog

Onboarding your first distributor – A recipe for success | Channelyze

Originally published by Channelyze. So you’ve decided it’s a good...
Read More
5 Ways Organizations can Reduce IT Costs through ITAM 2.0 | Lansweeper
Blog ITAM Blog Lansweeper Blog

5 Ways Organizations can Reduce IT Costs through ITAM 2.0 | Lansweeper

As organizations adopt new technologies and assets to support digital...
Read More
How Cyber Attacks Pose a Greater Threat After Pandemic  | Bfore.AI
Bfore.AI Blog Blog

How Cyber Attacks Pose a Greater Threat After Pandemic | Bfore.AI

Originally published by Bfore.AI. The pandemic is the worst time...
Read More
The Five Ways to Recover iPhone Deleted Data | Elcomsoft
Elcomsoft Blog Notifications

The Five Ways to Recover iPhone Deleted Data | Elcomsoft

iOS security model offers very are few possibilities to recover...
Read More
The Top 6 Worst Tech Nightmares Haunting IT Pros | Lansweeper
Blog Lansweeper Blog

The Top 6 Worst Tech Nightmares Haunting IT Pros | Lansweeper

Your network faces nightmares from cybercriminals, system errors and more....
Read More
What is continuous web application security? | Acunetix
Acunetix Blog Notifications

What is continuous web application security? | Acunetix

The term continuous security in the context of web application...
Read More
Monitoring Modbus in industrial environments | Paessler
Notifications Paessler Blog

Monitoring Modbus in industrial environments | Paessler

Modbus. It’s a fieldbus protocol that’s been around longer than...
Read More
The First Step to Making Cloud Computing More Cost-Effective | Lansweeper
Blog Lansweeper Blog

The First Step to Making Cloud Computing More Cost-Effective | Lansweeper

Cloud migrations have become increasingly popular among corporations and for...
Read More
The secret world of the hidden channels – A market worth attempting?  | Channelyze
Blog Channelyze Blog

The secret world of the hidden channels – A market worth attempting? | Channelyze

Originally published by Channelyze. With China coming in second on...
Read More
Cybersecurity Month: 6 Ways to Avoid Phishing | TSFactory
Notifications TSFactory Blog

Cybersecurity Month: 6 Ways to Avoid Phishing | TSFactory

It’s nearly the end of Cybersecurity Awareness Month 2021 and...
Read More
iCloud Extractions Without Passwords and Tokens: When a Trusted Device is Enough | Elcomsoft
Blog Elcomsoft Blog

iCloud Extractions Without Passwords and Tokens: When a Trusted Device is Enough | Elcomsoft

Many are looking for a one-click solution for mobile extractions...
Read More
Why You Need a Digital Inventory | Reflectiz
Notifications Reflectiz Blog

Why You Need a Digital Inventory | Reflectiz

Whether monetizing, analytics, or even customer interaction, these website digital...
Read More
The mysterious art of channel marketing  | Channelyze
Blog Channelyze Blog

The mysterious art of channel marketing | Channelyze

Originally published by Channelyze. We need to understand the role...
Read More
Stop the Frustration and Risk of Unchecked Access to Files and Folders | IS Decisions
Blog ISDecision Blog

Stop the Frustration and Risk of Unchecked Access to Files and Folders | IS Decisions

Following the recent updates to FileAudit, the article discuss how...
Read More
VNC Connect | Helping doctors improve patient care in difficult times
Notifications RealVNC Blog

VNC Connect | Helping doctors improve patient care in difficult times

VNC Connect™ has always been a great partner to the...
Read More
Prepare Your Online Store for the Holidays | Reflectiz
Blog Reflectiz Blog

Prepare Your Online Store for the Holidays | Reflectiz

In recent years, client-side attacks gained popularity among threat actors....
Read More
Here’s a New Free Tool to Discover Unprotected Cloud Storage Instances | ImmuniWeb
ImmuniWeb Blog Notifications

Here’s a New Free Tool to Discover Unprotected Cloud Storage Instances | ImmuniWeb

ImmuniWeb®  new free cloud security test enables cybersecurity and IT professionals to...
Read More
The Top React Chart Library You Need To Know In 2021  | FusionCharts
Blog FusionCharts Blog

The Top React Chart Library You Need To Know In 2021 | FusionCharts

Implementing user-friendly charts can be challenging. You don’t want to...
Read More
Build Your Next Software Installation in the Cloud | Revenera
InstallShield Blog Notifications Revenera Blog

Build Your Next Software Installation in the Cloud | Revenera

Revenera’s InstallShield solution—the industry standard for developers creating software installers—has...
Read More
Work From Home Challenges for IT Support Service Desk | FastPass
Blog FastPassCorp

Work From Home Challenges for IT Support Service Desk | FastPass

Overnight, all over the world, users are staying or working...
Read More
How to Get the Most Out of Your Investment Analytics  | FusionCharts
Blog FusionCharts Blog

How to Get the Most Out of Your Investment Analytics | FusionCharts

If you are looking to get the best out of...
Read More
Remote Working & GDPR | TSFactory
Notifications TSFactory Blog

Remote Working & GDPR | TSFactory

Businesses must maintain higher standards of secure access and prioritize...
Read More
Great Ways RealVNC can help IT professionals in education
Notifications RealVNC Blog

Great Ways RealVNC can help IT professionals in education

Educational institutions are adopting a hybrid learning model that enables...
Read More
LEAD Technologies Celebrates the Release of LEADTOOLS Version 22
LeadTools Blog Notifications

LEAD Technologies Celebrates the Release of LEADTOOLS Version 22

LEAD Technologies is very pleased to introduce LEADTOOLS Version 22....
Read More
ImmuniWeb Named to 2021 AIFinTech100 List
ImmuniWeb Blog Notifications

ImmuniWeb Named to 2021 AIFinTech100 List

Exciting News! ImmuniWeb is selected among 100 of the world’s...
Read More
Silobreaker presented with Frost & Sullivan’s 2021 Best Practices Enabling Technology Leadership Award in the global threat intelligence market
Notifications Silobreaker Blog

Silobreaker presented with Frost & Sullivan’s 2021 Best Practices Enabling Technology Leadership Award in the global threat intelligence market

Silobreaker, a pioneer of building technology that makes sense of...
Read More
What is HTTP header injection? | Acunetix
Acunetix Blog Notifications

What is HTTP header injection? | Acunetix

HTTP header injection is a technique that can be used...
Read More
Hybrid Cloud Storage Protection for MSPs | IS Decisions
Blog ISDecision Blog

Hybrid Cloud Storage Protection for MSPs | IS Decisions

Cyber threats such as ransomware, identity theft, and data exfiltration,...
Read More
New Updates on ImmuniWeb Discovery 2021
ImmuniWeb Blog Notifications

New Updates on ImmuniWeb Discovery 2021

ImmuniWeb announces their new updates on ImmuniWeb Discovery. The improvements...
Read More
InstallShield 2021 Now Released
InstallShield Blog Notifications Revenera Blog

InstallShield 2021 Now Released

Revenera announced the availability of InstallShield 2021. The leading solution...
Read More
Integrating Acunetix with GitLab for CI/CD
Acunetix Blog Notifications

Integrating Acunetix with GitLab for CI/CD

HTTP header injection is a technique that can be used...
Read More
Reflectiz Officially Receives ISO 27001 Certification
Notifications Reflectiz Blog

Reflectiz Officially Receives ISO 27001 Certification

Reflectiz is now officially ISO/IEC 27001:2013 certified. This essentially means...
Read More
The iPhone Upgrade: How to Back Up and Restore iOS Devices Without Losing Data
Elcomsoft Blog Notifications

The iPhone Upgrade: How to Back Up and Restore iOS Devices Without Losing Data

One of the main problems of iCloud forensics is the...
Read More
What to look for in a DAST solution | Netsparker
Invicti Blog Notifications

What to look for in a DAST solution | Netsparker

Choosing a DAST product that will work for your specific...
Read More
What is a digital nomad and how can VNC technology help?
Notifications RealVNC Blog

What is a digital nomad and how can VNC technology help?

The term ‘digital nomad’ has gained popularity in the last...
Read More
How to use VNC to remotely control a PC from your iPhone
Blog RealVNC Blog

How to use VNC to remotely control a PC from your iPhone

VNC Viewer for iPhone makes it simple to control your...
Read More
Falcongaze SecureTower 6.5 – better control, stronger protection | Falcongaze
Blog Falcongaze Blog

Falcongaze SecureTower 6.5 – better control, stronger protection | Falcongaze

Falcongaze, a developer of data breach protection and personnel control...
Read More
Introduction to web cache poisoning | Netsparker
Blog Invicti Blog

Introduction to web cache poisoning | Netsparker

Content caching by web servers and content delivery networks has...
Read More
Addressing User Access in IT Security Compliance | IS Decisions
Blog ISDecision Blog

Addressing User Access in IT Security Compliance | IS Decisions

The risks of non-compliance are not worth taking. You face...
Read More
Understanding and preventing cross-site scripting vulnerabilities (XSS) | Netsparker
Blog Invicti Blog

Understanding and preventing cross-site scripting vulnerabilities (XSS) | Netsparker

Cross-site scripting (XSS) vulnerabilities are among the most common web...
Read More
Password Obituary: But is the Humble Password Really Dead? | FastPassCorp
Blog FastPassCorp SSPR Blog

Password Obituary: But is the Humble Password Really Dead? | FastPassCorp

Password – you’re OK! Not OK like in perfect. Sure,...
Read More
5 reasons why every MSSP needs a professional web application security solution | Acunetix
Acunetix Blog Blog

5 reasons why every MSSP needs a professional web application security solution | Acunetix

Here are the 5 primary reasons why MSSPs need to...
Read More
Importance of Password Policy and Password Security Risks | FastPassCorp
Blog FastPassCorp SSPR Blog

Importance of Password Policy and Password Security Risks | FastPassCorp

It is importance that passwords and processes around passwords are...
Read More
Understanding session fixation attacks | Netsparker
Blog Invicti Blog

Understanding session fixation attacks | Netsparker

Session fixation attacks can allow the attacker to take over...
Read More
Why DAST is the perfect fit for agile software projects | Netsparker
Blog Invicti Blog

Why DAST is the perfect fit for agile software projects | Netsparker

To deliver the full project scope on schedule and within...
Read More
Complete End-to-End Management and Security for Connected Devices | ArcusTeam & Lansweeper
Blog DeviceTotal Blog Lansweeper Blog

Complete End-to-End Management and Security for Connected Devices | ArcusTeam & Lansweeper

Today’s networks are constantly expanding and evolving with the addition...
Read More
Is Your Business Ready for Windows 11? | Lansweeper
Blog Lansweeper Blog

Is Your Business Ready for Windows 11? | Lansweeper

With Microsoft's release of Windows 11 just around the corner,...
Read More
6 Steps Guide: Reduce the risk of data breach in 2020 with Password Self Service | FastPassCorp
Blog FastPassCorp SSPR Blog

6 Steps Guide: Reduce the risk of data breach in 2020 with Password Self Service | FastPassCorp

This guide is an ultimate source of inspiration to help...
Read More
Digital Security in the Travel and Tourism Industry | Reflectiz
Blog Reflectiz Blog

Digital Security in the Travel and Tourism Industry | Reflectiz

The travel and tourism industry was reaching peak digitalization levels...
Read More
How Lansweeper Can Help You Catch Cryptojackers | Lansweeper
Blog Lansweeper Blog

How Lansweeper Can Help You Catch Cryptojackers | Lansweeper

Cryptocurrency market size is projected to grow to more than...
Read More
Silobreaker wins three Global Infosec Awards
Blog Silobreaker Blog

Silobreaker wins three Global Infosec Awards

Intelligence technology company Silobreaker is proud to announce it has...
Read More
What is SCA and why you need it | Acunetix
Acunetix Blog Blog

What is SCA and why you need it | Acunetix

The security of your business depends not just on your...
Read More
Are You Sitting on an Enterprise Device Security Time Bomb? | ArcusTeam
Blog DeviceTotal Blog

Are You Sitting on an Enterprise Device Security Time Bomb? | ArcusTeam

In this blog post, ArcusTeam discusses what we perceive as...
Read More
Why your VPN connections need two-factor authentication | IS Decisions
Blog ISDecision Blog

Why your VPN connections need two-factor authentication | IS Decisions

Businesses who have moved to the cloud for storage are...
Read More
VNC vs RDP: which remote desktop tool is the best? | RealVNC
Blog RealVNC Blog

VNC vs RDP: which remote desktop tool is the best? | RealVNC

Sometimes you need to retrieve work files and documents or...
Read More
Why SSPR fails and what to do about it | FastPassCorp
Blog FastPassCorp SSPR Blog

Why SSPR fails and what to do about it | FastPassCorp

Many self-service password reset solutions (SSPR) have very low user...
Read More
DDoS-attack: what is it and how to prevent it | Falcongaze
Blog Falcongaze Blog

DDoS-attack: what is it and how to prevent it | Falcongaze

If your server suddenly has a huge number of requests,...
Read More
India Privacy and Data Protection Bill | Reflectiz
Blog Reflectiz Blog

India Privacy and Data Protection Bill | Reflectiz

To manage eCommerce websites and eService platforms at this current...
Read More
What is Vulnerability Management and Why Does Your Enterprise Need It? | ArcusTeam
Blog DeviceTotal Blog

What is Vulnerability Management and Why Does Your Enterprise Need It? | ArcusTeam

Vulnerability management is crucial as its goal is to eliminate...
Read More
Protecting Active Directory logins for remote working | IS Decisions
Blog ISDecision Blog

Protecting Active Directory logins for remote working | IS Decisions

Businesses who have moved to the cloud for storage are...
Read More
Spam: what kinds of it are there and how to understand that it is fraudulent? | Falcongaze
Blog Falcongaze Blog

Spam: what kinds of it are there and how to understand that it is fraudulent? | Falcongaze

Fraudulent actors have a lot of methods to steal users’...
Read More
Top 5 Connected Device Security Challenges that CISOs are Facing | ArcusTeam
Blog DeviceTotal Blog

Top 5 Connected Device Security Challenges that CISOs are Facing | ArcusTeam

CISOs across industries are faced with five major challenges, as...
Read More
Why SMBs believe their data is unsafe in the cloud | IS Decisions
Blog ISDecision Blog

Why SMBs believe their data is unsafe in the cloud | IS Decisions

Businesses who have moved to the cloud for storage are...
Read More
New Feature: An Advanced Tool for Domain Security for your Website | Reflectiz
Blog Reflectiz Blog

New Feature: An Advanced Tool for Domain Security for your Website | Reflectiz

The new and advanced Domain Security feature from Reflectiz allows...
Read More
How to Search Billions of Logs Without learning New Script Language With SureLog SIEM?
Blog SureLog SIEM Blog

How to Search Billions of Logs Without learning New Script Language With SureLog SIEM?

ANET is a SIEM pioneer with clients throughout the world...
Read More
Device Vulnerability and Threat Management Solutions | ArcusTeam
Blog DeviceTotal Blog

Device Vulnerability and Threat Management Solutions | ArcusTeam

Network scanning is basically the mapping of all active devices...
Read More
Zero-Day Vulnerability Exploits 101: A Glossary | ArcusTeam
Blog DeviceTotal Blog

Zero-Day Vulnerability Exploits 101: A Glossary | ArcusTeam

A zero-day (0day) vulnerability is an existing vulnerability in software...
Read More
What is Vishing? | FastPassCorp
Blog FastPassCorp IVM Blog

What is Vishing? | FastPassCorp

Vishing or Vishing Attack is when a criminal impersonates a victim to...
Read More
How to Avoid Weak Passwords in Active Directory | FastPassCorp
Blog FastPassCorp IVM Blog

How to Avoid Weak Passwords in Active Directory | FastPassCorp

Weak or stolen passwords are involved in more than 80%...
Read More
Your CMDB Is a Valuable Tool – but Only If You Can Trust It | Lansweeper
Blog Lansweeper Blog

Your CMDB Is a Valuable Tool – but Only If You Can Trust It | Lansweeper

Your CMDB can provide the foundation for IT service management...
Read More
Invicti recognized on the 2021 Gartner Magic Quadrant for Application Security Testing | Acunetix
Acunetix Blog Blog Invicti Blog

Invicti recognized on the 2021 Gartner Magic Quadrant for Application Security Testing | Acunetix

We are thrilled for Invicti to be recognized for the...
Read More
Understanding the “After Ransomware” helps MSPs protect against it | IS Decisions
Blog ISDecision Blog

Understanding the “After Ransomware” helps MSPs protect against it | IS Decisions

Advertisements might seem like something that poses no risks to...
Read More
Preventing Malvertising in your Organization | Lansweeper
Blog Lansweeper Blog

Preventing Malvertising in your Organization | Lansweeper

Advertisements might seem like something that poses no risks to...
Read More
5 Major Benefits of Early Security Testing | Acunetix
Acunetix Blog Blog

5 Major Benefits of Early Security Testing | Acunetix

It is no secret that early security testing is beneficial....
Read More
How to avoid web supply chain attacks | Acunetix
Acunetix Blog Blog

How to avoid web supply chain attacks | Acunetix

Does your business use any third-party web applications? If so,...
Read More
ImmuniWeb® AI Platform Major Update Q2 2021
Blog ImmuniWeb Blog

ImmuniWeb® AI Platform Major Update Q2 2021

After successfully passing our annual ISO 27001 audit by SGS,...
Read More
All You Need to Know About Web Skimming Attacks | Reflectiz
Blog Reflectiz Blog

All You Need to Know About Web Skimming Attacks | Reflectiz

Web skimming, also known as digital skimming, is a hacking...
Read More
How to Spot and Stop Malware | ANET
Blog SureLog SIEM Blog

How to Spot and Stop Malware | ANET

Organizations still get hit with malware and ransomware in spite...
Read More
Diagnose, Prevent and Fix Hardware Failure | Lansweeper
Blog Lansweeper Blog

Diagnose, Prevent and Fix Hardware Failure | Lansweeper

Hardware failures are one of the few unexpected occurrences that...
Read More
Reflectiz Wins Prestigious Cyber Defense Magazine Awards
Blog Reflectiz Blog

Reflectiz Wins Prestigious Cyber Defense Magazine Awards

Reflectiz, the emerging Israeli cybersecurity startup, receives “Next-Gen in Digital...
Read More
Ad-hoc scanning is not enough | Acunetix
Acunetix Blog Blog

Ad-hoc scanning is not enough | Acunetix

With a major increase in the complexity and availability of...
Read More
AdminStudio 2021 Now Released!
Blog Flexera Blog

AdminStudio 2021 Now Released!

Flexera has just announced the new release of AdminStudio 2021!...
Read More
How ITAM 2.0 Enables Big Opportunities For IT Cost Optimization | Lansweeper
Blog ITAM Blog Lansweeper Blog

How ITAM 2.0 Enables Big Opportunities For IT Cost Optimization | Lansweeper

Covid-19's unprecedented global economic impact has forced CIOs to find...
Read More
How to use FastCube .NET in Vue SPA application | Fast Reports
Blog FastReport Blog

How to use FastCube .NET in Vue SPA application | Fast Reports

The Vue.js framework is currently very popular and stands in...
Read More
Simplified cloud deployment for Burp Suite Enterprise Edition | Portswigger
Blog Portswigger Blog

Simplified cloud deployment for Burp Suite Enterprise Edition | Portswigger

Since the initial launch of Portswigger cloud-friendly solution, we have...
Read More
Improved CI/CD integrations in Burp Suite Enterprise Edition | Portswigger
Blog Portswigger Blog

Improved CI/CD integrations in Burp Suite Enterprise Edition | Portswigger

Burp Suite Enterprise Edition was designed to support your DevSecOps...
Read More
InstallAnywhere 2021 Now Released
Blog InstallAnywhere Blog Revenera Blog

InstallAnywhere 2021 Now Released

The new version of InstallAnywhere 2021 is now available for...
Read More
API Scanning with Burp Suite | Portswigger
Blog Endpoint Security Blog Portswigger Blog

API Scanning with Burp Suite | Portswigger

Both Burp Suite Professional and Burp Suite Enterprise Edition contain...
Read More
Detecting Unusual Activities Using SureLog Next Generation SIEM | ANET
Blog SureLog SIEM Blog

Detecting Unusual Activities Using SureLog Next Generation SIEM | ANET

Next-Gen SIEM Platform can help organizations detect and respond to...
Read More
Reflectiz | Content Security Policy (CSP): Not Exactly a Magecart Vaccine
Blog Reflectiz Blog

Reflectiz | Content Security Policy (CSP): Not Exactly a Magecart Vaccine

It is important for eCommerce websites and online businesses to...
Read More
InstallShield 2020 R3 Now Available
Blog InstallShield Blog

InstallShield 2020 R3 Now Available

InstallShield is the fastest, easiest way to build Windows installers...
Read More
Sign up for the 30-day Free Trial for Deep Freeze
Blog Faronics Blog Offer

Sign up for the 30-day Free Trial for Deep Freeze

Sign up for the 30-day Free Trial for Deep Freeze
Read More
Customers’ Choice in 2020 Gartner Peer Insights
Acunetix Blog Blog

Customers’ Choice in 2020 Gartner Peer Insights

The Acunetix team is excited to announce that we have...
Read More
Reflectiz | The Coronavirus Impacts on Cybersecurity
Blog Reflectiz Blog

Reflectiz | The Coronavirus Impacts on Cybersecurity

This new era presents increased third-party risks, especially when everything...
Read More
Why SureLog is the Right SIEM Solution for you
Blog SureLog SIEM Blog

Why SureLog is the Right SIEM Solution for you

The right SIEM tool varies based on a business’ security...
Read More
Reflectiz | The Gocgle Malicious Campaign
Blog Reflectiz Blog

Reflectiz | The Gocgle Malicious Campaign

A new web skimming campaign is impersonating Google web products...
Read More
InstallShield 2020 R2 Now Available
Blog InstallShield Blog

InstallShield 2020 R2 Now Available

InstallShield 2020 R2 is now available. Customers can download the...
Read More
Acunetix now introduces Chinese Language Support in the UI
Acunetix Blog Blog

Acunetix now introduces Chinese Language Support in the UI

Acunetix update introduces Chinese language support in the UI, allowing...
Read More
Introducing Installshield 2020 !
Blog InstallShield Blog

Introducing Installshield 2020 !

LOGON has been a Flexera partner for over 10 years....
Read More
Introducing Acunetix Version 13 !
Acunetix Blog Blog

Introducing Acunetix Version 13 !

Acunetix is now fully integrated with a network scanner. You...
Read More
Acunetix version 12 is now released!
Acunetix Blog Blog

Acunetix version 12 is now released!

Acunetix's new build introduces a new scanning algorithm that removes...
Read More
InstallAnywhere 2020 now Available !
Blog InstallAnywhere Blog Revenera Blog

InstallAnywhere 2020 now Available !

With the newly released InstallAnywhere 2020, it adapts seamlessly to...
Read More
Flexera Launches Package Feed Module for AdminStudio
Blog InstallShield Blog

Flexera Launches Package Feed Module for AdminStudio

The Package Feed Module provides integrated downloading along with valuable...
Read More
What’s new in FileAudit 6? Now Monitor Files on the Cloud!
Blog ISDecision Blog Release Automation

What’s new in FileAudit 6? Now Monitor Files on the Cloud!

Traditionally, FileAudit monitored files and folders on Windows Active Directory-based...
Read More
Announcing InstallShield 2019 !
Blog InstallShield Blog

Announcing InstallShield 2019 !

InstallShield 2019, Build Native MSIX Packages and Easily Convert MSI...
Read More

Privacy Policy Company Overview

COMPANY

Our Location Career with LOGON Our Partners

SERVICES

Training Services Implementation Services Pre-Sales and Post-Sales Services Best Practices Consulting

GET IN TOUCH

Phone:
Hong Kong: +852 2512 8491
India: +91 70220 22744 / +91 63668 26133
Email: [email protected] ©2025 LOGON International Ltd. All rights reserved
logon logo WHITE Image Image Image

Search engine

Use this form to find things you need on this site

More results...

Fill in the form below
  • This field is for validation purposes and should be left unchanged.
  • This field is hidden when viewing the form
  • This field is hidden when viewing the form

Watch On-demand Webinar

  • This field is for validation purposes and should be left unchanged.

Get Your Free UserLock Trial

  • This field is for validation purposes and should be left unchanged.

Download Your Free Trial 10-Day Trial Today

  • Downloading and evaluating Smart Package Studio is quick and easy
  • Includes a short introductory guide that suggests smart features to try
  • Access the full functionality of Smart Package Studio during the trial
  • This field is for validation purposes and should be left unchanged.

Request for Priority Support with our support team

  • This field is for validation purposes and should be left unchanged.
  • Drop files here or
    Max. file size: 30 MB.

    Get Free Assessment of your Web Asset

    Request a free non-intrusive security assessment of your website. Get a report with an overview of client-side security risks.

    • This field is for validation purposes and should be left unchanged.
    • This field is hidden when viewing the form

    Recommend a Topic

    • This field is for validation purposes and should be left unchanged.

    Partner with Us on the next episode

    • This field is for validation purposes and should be left unchanged.

    Request Quote for Lansweeper

    Oops! We could not locate your form.

    Advertisement

    Watch On-demand Webinar

    • This field is for validation purposes and should be left unchanged.
    Start PreCrime Network for Free

    Oops! We could not locate your form.

    Advertisement

    Book a Free Demo Today

    Get Your Free Trial

    Oops! We could not locate your form.

    Advertisement
    Get Your Free Trial
    • This field is for validation purposes and should be left unchanged.
    • This field is hidden when viewing the form
    • This field is hidden when viewing the form
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Request for Training Quote
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    • Image
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Advertisement