Our Blog
Home / Blog

How Apple plans to monitor users
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices. In early August 2021, Apple unveiled its new system for identifying photos containing images of child abuse. Although Apple’s motives —...

Resources Menu Changes, List Pages Column Selection, Updated Credential Management and more in v17.05.00
Device42 v17.05.00 includes user interface improvements to make it easier for customers to refine and customize their views of their environment’s infrastructure, updated discovery credential management, and also addresses multiple bug fixes. Resources Menu Changes...

SaaS Benefits and Why You Need SaaS Management
SaaS Benefits and Advantages Did you know the average company is using 80 software-as-a-service (SaaS) applications? In fact, the average company now pays for 20 times more SaaS subscriptions today than it did five years ago. One of the largest SaaS benefits is its...

Behind the jargon: False negatives in application security
Looking at research into web security testing, you will see a lot of talk about reducing false positives – but occasionally, you may also see the term “false negative”. Let’s cut through the jargon to see what false negatives are, what they mean for accuracy and...

11 Biggest cyber security threats in 2021
Cyber security threats persist and continue to emerge during the last years. By now you probably heard about phishing, but did you know about polyglot files yet? This article covers a unique insight to the 11 biggest cyber security threats in 2021. 1. Phishing meets...