Cyber Hygiene
Dave Ruedger, CISO – How AidenVision improves cyber risk visibility
Sean Maloney, Aiden's technical co-founder, explains why he created Aiden's technology and hints at what we're launching next week to complete his vision for providing a fully-automated desired state configuration (DSC) solution to our customers.
Application deployment dashboards are a security risk
Out-of-the-box application deployment dashboards only show what types of machines are in your environment and if your software application package was (or wasn’t) successfully deployed on various machines. Unless you're IT team has put in a ridiculous amount of time customizing your application deployment dashboard, they don’t answer the much harder question that IT security teams are left trying ...
“This Completes the Dream” – Sean Maloney’s vision for Aiden comes to life with our next big release
Sean Maloney, Aiden's technical co-founder, explains why he created Aiden's technology and hints at what we're launching next week to complete his vision for providing a fully-automated desired state configuration (DSC) solution to our customers.
Computer Imaging is Dead
E-BOOK Computer Imaging Is Dead. Computer Imaging: An Old Concept Pros & Cons of Traditional Computer Imaging Benefits of Hyperautomated Endpoint Management Read how modern IT teams are saying goodbye to computer imaging and hello to dynamic and automated bare-metal builds. Technology’s rapid ...
Why Software Patch Management Isn’t a Silver Bullet to Remediate Vulnerabilities
Software patching is an important part of remediating vulnerabilities … but patch management comes with plenty of challenges. This post covers why software patching is critical, the patching challenges organizations face, and how to fix them.
3 Reasons to Run a Tabletop Exercise To Determine Your IT Budget
Who knew that creating an IT budget for the upcoming year would require a crystal ball? In these unpredictable times, planning an IT budget is challenging at best. Your organization likely isn’t going back to “normal” anytime soon. Between remote work and an increase in crafty cybersecurity attacks, creating an IT budget is daunting when you don’t know what curveballs ...
3 Emerging Technologies For Achieving Zero Trust
(Zero) Trust What effect does trust have in cybersecurity? To understand, we might consider what happened in late March, 1999, when millions of people received emails from their friends, family and coworkers. In each case, the format was the same. Title: “Important Message from [Name of Sender].” Message: “Here is that document you asked for...don't show anyone else ;-)” ...
10 Benefits of IT Automation
Lighting fast compliance, robust vulnerability and patching management, and fewer IT support tickets are just a few of the benefits you can expect by empowering your IT teams with automation.
7 Ways Hackers Will Steal Your Data Using Advanced Automation
Hackers are using automation to outsmart anti-virus programs and hack into network systems at unprecedented speed and scale.
Security by Design: Advocating for a Security-first Software Paradigm
Making security a part of the software design process, using frameworks like Zero-Trust, is needed to counter today's cybersecurity threats.
5 Ways to Beat Sophisticated Threat Actors with Security Automation
The advancement in cybercrime tactics like the use of automation has left IT teams in the dust. Here are 5 ways that you can defend against them using security automation technology.
SolarWinds State-Sponsored Supply Chain Attack vs. Standard Supply Chain Attacks
Supply chain attacks became a threat actor’s goldmine in 2020. With its low barrier to entry and effectiveness, different levels of threat actors continue to leverage supply chain attacks as a viable method to facilitate far-reaching nefarious activities, including espionage, sabotage, intellectual property theft, etc. Although the average supply chain attack is perpetrated by a cybercriminal with purely financial interests, ...
Our Response to the SolarWinds Hack – A Global Cyber Pledge
Why should I take the #globalcyberpledge? How we're solving cybersecurity by individuals coming together and getting educated? What is the need for continuous improvement? Our privacy and freedom are under attack by foreign, state-sponsored bad actors and we’re standing by letting it happen. Why? Because the answers are right in front of us yet we remain complacent. Back in ...
How Financial Organizations Can Recover From and Prepare for a Ransomware Attack
The recent proliferation of ransomware attacks is staggering; the virtual working environment, driven in part by the way COVID-19 exacerbated the situation. One security vendor, Skybox Security, found that, thus far, ransomware incidents grew by 72% throughout the pandemic. It's likely that your financial institution is already taking the threat of a ransomware attack seriously. But does your firm have ...
The Importance of Vulnerability Scanning in a WFH Environment
Vulnerability scanning in the new WFH environment has become more critical than ever in identifying weaknesses, but how can IT teams keep up?
Why a Vulnerability Scan is Not Enough.
A vulnerability scan is good for identifying weaknesses in your cybersecurity posture, but they're not the answer to securing your network...here's why.
Get Updates Right In Your Inbox
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.