Quantifying and Managing Risks Information, Risk and Managing Risk Sateesh K S Adversities abound around us. There is always a potential for the “unexpected” to happen and derail our lives. The mere existence of these adversities is
Continuous Vulnerability and Patch Management: 10 SanerNow Features That Help Reduce Attack Surface Cyber security vulnerability assessment and patch management are an essential task for organizations to secure their IT environment. Organizations perform an audit-based vulnerability assessment exercise, once in a month or a quarter, while
IT asset management best practices Technology is rampantly changing and the investment that goes into IT assets is significant. To prioritise, effectively use, reduce costs and govern is a prime concern which otherwise leads to mis-utilisation of the
Cyber Security Industry Challenges and SanerNow- CEO Interview We took an opportunity to interview our CEO, Chandra on some of the challenges faced by Information Security industry in general and the philosophy behind SanerNow and what inspired SecPod Engineers to create
Cyber Security Resilience and Defense-In-Depth; A New Dimension Welcome to the world of Information Security. With 100s of product categories and 100s of vendors each claiming to solve all problems, it is a tough job figuring out what does and does
SanerNow Software Deployment Ensure Endpoints are always installed with Approved Software Packages Overview In this world of complex infrastructure, there are numerous operating systems and different endpoints - laptops, workstations, servers or virtualization, and BYODs. The
Choosing a Vulnerability Assessment tool OverviewVulnerability assessment is a crucial process as they scan for potential vulnerabilities that could be exploited. Anyone who is concerned about their Enterprise Security wouldn’t compromise on not having a cutting-edge vulnerability
SanerNow 4.1.1.0: Empowered with Real Time Visibility Overview Visibility is key to securing IT infrastructure and SanerNow is enriched with many tools to provide clear insight into organization’s endpoints. When it comes to defending an attack or detecting and
Security Top 5 reasons to switch to cloud based patch management OverviewUn-patched Endpoints are a major cause of security attacks and are a serious challenge before IT security teams. Let us understand on the impact of new age patch solutions and how they could
Security Continuous Risk Assessment and Continuous Mitigation Continuous security can only be achieved with continuous visibility, continuous assessment and a continuous mitigation plan. Tools must be effective, easy to deploy and manage and not lead to cyber security chaos. If tools aren’t supportive, time to invest in tools that are supportive.
Security Cyber Hygiene: Uncool but Necessary Overview If you analyze any of the recent published attacks, two patterns emerge, 80-90% of the attacks exploit an unpatched vulnerability or an unhardened, widely open system 70% of the attacks begin at