How to Manage Your Nessus Software Updates

Learn how to take advantage of the newest features in Nessus 8.10 to get greater control over your Nessus experience. Manual or automated – that is the question. Nessus Professional 8.10 offers system administrators a bit of both. From new update options that allow you to align Nessus updates with your risk stance to the…

Details

How to Protect Yourself from Software Vulnerabilities

Identifying software vulnerabilities is essential in protecting your business against cybersecurity threats. From ransomware to data heists, a wide range of attack types use software vulnerabilities as an entry point into IT configurations. Dealing with security vulnerabilities requires identifying them in the first place. Before you can start to develop strategies for identifying weak points…

Details

Why Partners Choose IGEL for VDI and Cloud Workspaces

IGEL partners collectively agree: for virtual desktop infrastructure (VDI) and cloud workspace implementations, there really isn’t a solution like IGEL OS. IGEL’s laser focus on end user computing, with simple and consistent endpoint management, and the portability and flexibility to transform any device into a managed IGEL endpoint, make the IGEL solution unique. Jim Veraldi,…

Details

Am I Smart or Just Lucky? Understanding Your Process Integrity Risk with Tenable Lumin

Business system risk and process integrity risk are two essential metrics for a mature risk-based vulnerability management practice. With new assessment maturity scoring, Tenable Lumin now gives you insights into both. Risk-based vulnerability management requires metrics addressing two types of risks: Business system risk Process integrity risk Reducing business system risk requires understanding which assets…

Details