How Scanners Find Vulnerabilities

How Scanners Find Vulnerabilities

Vulnerability scanners are not that different from virus scanners. In both cases, the goal of the software is to find something out of the ordinary in the target. A virus scanner scans local resources and local storage of a computer to find potentially malicious...
Data Is the Gold of the Future

Data Is the Gold of the Future

Data is invaluable for companies. For this reason, it’s not just cybercriminals who are interested in spying on, manipulating, or destroying this data. It’s not only productivity that will suffer if an incident actually happens in a company. The entire IT landscape...
Snow and BigFix Inventory: More Data, Less Agents

Snow and BigFix Inventory: More Data, Less Agents

One of the biggest challenges IT leaders reported facing over the past 12 months has been supporting the remote workforce, according to Snow’s new 2021 IT Priorities Report. Covid-19 has changed traditional ways of working, and in turn, it has also opened new...
A Technical Blueprint for Data Protection

A Technical Blueprint for Data Protection

What’s the point of deploying DLP if you don’t implement the ‘P’? That’s where Robert Mechler, our Principal Security Strategist and I start the discussion. Among many topics, we also discuss the role of dynamic data protection and the nine essentials for data...