Breaking the money mule’s back

Breaking the money mule’s back

In any bank fraud scheme, the criminals need to move funds to clean accounts or cash them out, and that means laundering. To cover their tracks, they transfer funds, first to money mules and thence somewhere else. At RSA Conference 2021, representatives of several...
VMWARE AUTODISCOVERY BUG FIX IN V17.01.01

VMWARE AUTODISCOVERY BUG FIX IN V17.01.01

Update Overview Device42 v17.01.01 includes a fix for a VMware Hypervisor autodiscovery bug. Bug Fixes An issue in which VMware Hypervisor autodiscovery jobs were sometimes not correctly returning parent object information in v17.00.00 has been...
What is Application Rationalization?

What is Application Rationalization?

Good question.  Application rationalization has many interpretations. Gartner says “Application rationalization is the radical reshuffling of an application portfolio as part of an application strategy, a plan that implements changes to applications to achieve a...
Agile DevOps, waterfall AppSec

Agile DevOps, waterfall AppSec

Talking to customers and prospects, we see one challenge coming up repeatedly: application security is lagging behind DevOps in terms of speed and workflow maturity. This persistent gap is costing organizations time and money – and putting them at risk of data...
Sensitive data exposure – how breaches happen

Sensitive data exposure – how breaches happen

The term sensitive data exposure means letting unauthorized parties access stored or transmitted sensitive information such as credit card numbers or passwords. Most major security breaches worldwide result in some kind of sensitive...
IDENTIFYING WASTE IN MICROSOFT 365

IDENTIFYING WASTE IN MICROSOFT 365

The pandemic has arguably been the greatest accelerator of digital transformation, spurring a global move to remote working, and forever altering the way we work. Many organizations have risen to the challenge, adopting new processes and tools to continue to work...