Our Blog
Home / Blog

Read the Top Security Recommendations for Hybrid Workplaces
Hybrid work environments that support a mix of at-home and in-office arrangements are emerging as COVID-19 restrictions are gradually lifted. Besides factors such as productivity and collaboration, security is a critical component when establishing a hybrid workspace....

Strategies and Use Cases for Private Cloud Security
When cloud migration originally started, some organizations often adopted public cloud services because the costs for operating, designing, and maintaining private cloud deployments seemed unsustainable. However, as cyber criminals increasingly target public cloud...

Endpoint detection and response: The path to security maturity starts with visibility
Looking to set off on the right foot with endpoint detection and response? Prioritize visibility into your systems.For organizations considering adoption of an endpoint detection and response (EDR) solution, MITRE Engenuity’s most recent ATT&CK® Evaluation...

A trick auction to steal gold in World of Warcraft
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second. When scammers target gamers, they are typically pursuing gaming accounts. Today, we’re discussing a different target: players’ gold. As games go, the massively...

NEW AFFINITY GROUP AND DATABASE CONNECTIVITY WIDGETS, AWS ROLES EDITOR FOR AWS CLOUD AUTODISCOVERY AND MORE IN V17.03.00
Update Overview Device42 v17.03.00 includes new Affinity Group and Database Connectivity dashboard widgets to give you additional visual insight into your ADM environment. And as part of our ongoing improvements to cloud autodiscovery, v17.03.00 includes a new AWS...