Our Blog

Home / Blog

So, you’ve been encrypted

So, you’ve been encrypted

How to minimize the consequences of a corporate ransomware attack. You’ve read our thousand and one articles on guarding your network from every threat under the sun. But sometimes, despite all precautions, an infection gets in. Now is the time for cool heads and...

Who Polices The Police?

Who Polices The Police?

Discovery for continuous compliance and audit support IT teams are responsible for maintaining the security of the technology and data in any corporate environment. That’s a huge task that requires a lot of self-examination. Without a rigorous, ongoing...

5 Steps to Improving Your Cybersecurity Posture

5 Steps to Improving Your Cybersecurity Posture

It’s not easy keeping an organization online and secure at a time when new cybersecurity challenges seem to come up every day. To make your life a bit easier, here are 5 logical and interconnected steps to determining and improving your organization’s cybersecurity...

The Acunetix REST API

The Acunetix REST API

In addition to the user-friendly Acunetix user interface, all Acunetix functionality is also available through a built-in REST API. The REST API is available immediately upon installation and requires no configuration at all. All you need to do is open the Acunetix...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo