Secure Work Must Still be the Priority – at Home and Office

Much focus and attention in recent weeks has rightly focused on work-from-home strategies and business continuity planning. But bubbling up, underneath this topical priority, is an ever-increasing resurgence of security concerns. Initially organisations had to divert all their attention in ensuring employees could ‘work at home.’ Many now however, are the second phase of this…

Details

How to Manage Your Nessus Software Updates

Learn how to take advantage of the newest features in Nessus 8.10 to get greater control over your Nessus experience. Manual or automated – that is the question. Nessus Professional 8.10 offers system administrators a bit of both. From new update options that allow you to align Nessus updates with your risk stance to the…

Details

How to Protect Yourself from Software Vulnerabilities

Identifying software vulnerabilities is essential in protecting your business against cybersecurity threats. From ransomware to data heists, a wide range of attack types use software vulnerabilities as an entry point into IT configurations. Dealing with security vulnerabilities requires identifying them in the first place. Before you can start to develop strategies for identifying weak points…

Details

Why Partners Choose IGEL for VDI and Cloud Workspaces

IGEL partners collectively agree: for virtual desktop infrastructure (VDI) and cloud workspace implementations, there really isn’t a solution like IGEL OS. IGEL’s laser focus on end user computing, with simple and consistent endpoint management, and the portability and flexibility to transform any device into a managed IGEL endpoint, make the IGEL solution unique. Jim Veraldi,…

Details

Am I Smart or Just Lucky? Understanding Your Process Integrity Risk with Tenable Lumin

Business system risk and process integrity risk are two essential metrics for a mature risk-based vulnerability management practice. With new assessment maturity scoring, Tenable Lumin now gives you insights into both. Risk-based vulnerability management requires metrics addressing two types of risks: Business system risk Process integrity risk Reducing business system risk requires understanding which assets…

Details