Our Blog

Home / Blog

Acunetix Stance on the SolarWinds Hack

Acunetix Stance on the SolarWinds Hack

We at Acunetix and Invicti are deeply concerned with the aftermath of the SolarWinds hack and offer our deepest commiserations to all the security personnel who are facing this situation just before Christmas, and to SolarWinds themselves who have been an unwilling...

How do you prioritize the activities within your SAM program?

How do you prioritize the activities within your SAM program?

Earlier this year we participated in the ITAM Review Online Conference where our director, Sean Robinson, spoke around the SAM Agile method and how each organization can benefit at every stage of their SAM program. Following on from our speaking session, we have run a...

Data protection – the most important task now and in the future

Data protection – the most important task now and in the future

Data loss and theft, manipulation of data by outsiders who gain control over devices or systems, business interruptions, and extortion are all data protection related issues that are causing grave concern amongst IT managers as companies move to digitalize their...

Snow Joins IBM’s IASP Program

Snow Joins IBM’s IASP Program

Approximately two years ago, IBM’s Sanjay K. Saxena surveyed customers around the world to better understand their audit concerns and see what IBM could do to turn things around. As a result, the IBM Authorized SAM Provider Offering (IASP) was introduced as an...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo