Our Blog

Home / Blog

ESET launches version 6 of ESET Mobile Security for Android

ESET launches version 6 of ESET Mobile Security for Android

With more people working, learning and communicating remotely due to the coronavirus lockdowns, cybersecurity for mobile devices has never been more important. Individuals need peace of mind when using mobile devices, especially for the most sensitive apps that...

Survey on industrial cybersecurity in 2020

Survey on industrial cybersecurity in 2020

Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic. very security officer views remote connections to corporate systems as a potential threat. For infosec experts at industrial enterprises, and especially at...

How software asset management can reduce sox compliance risk

How software asset management can reduce sox compliance risk

In order to run your business successfully, software licensing and compliance is a significant consideration. Failure to perform due diligence in these areas can result in substantial and unnecessary expenses or even fines. What is SOX? More than 18 years ago, the...

The 14 Key Competencies of SAM (and ISO 19770-1:2017)

The 14 Key Competencies of SAM (and ISO 19770-1:2017)

You may have stumbled upon this blog and wondered, “What is ISO 19770-1:2017? Am I in the wrong place, or should I have prior knowledge in order to keep reading further?” Don’t worry, while this blog will be applicable to those who have experience, it’s all about how...

The Difference Between Red Teaming and Penetration Testing

The Difference Between Red Teaming and Penetration Testing

Automated application security testing has come a long way from its humble beginnings, but to really understand an organization’s security posture, you still need human expertise. Apart from penetration testing, which is a vital part of any cybersecurity program,...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo