Skip to main content

Blog

19.Oct.2017
Simon Rawet and Kristian Varnai
Security researchers from the Outpost24 SWAT team, Simon Rawet and Kristian Varnai, have identified and reported numerous vulnerabilities in BMC Remedy. The vulnerabilities range from relatively benign to full remote code execution without authentication.
17.Nov.2016
Rafael Alfaro
A web application including authentication usually allows the user access to various types of information. By the same token, several web applications provide advanced features that are assigned through different access levels.
29.Sep.2016
Niels Schweisshelm
Imagine heading to the office on Monday morning. The company you work for has been breached during the weekend and it’s your responsibility to notify the board members. You scroll through the e-mails you received from the security engineers and it turns out that an attacker has successfully compromised the enterprise network.
02.Aug.2016
Nils Thulin
You hear about security issues and breaches so often that you have almost stopped listening to it ..until you are targeted by an attacker. It is actually not that hard to raise the bar if everyone just would do the basic security measures we would not hear so much about security issues.
27.Jul.2016
Nils Thulin
here are still serious exploits from 2010 that are not patched today...and even though solutions exists; a lot of organizations have not remediated those exploits why one should focus on Patch Management.
20.Jul.2016
Nils Thulin
Data breaches are nowadays a common factor risk but there are ways to reduce the risk. Know your assets and get on top of your infrastructure, even if you have Signature-Based Defences and Content-Based Protection you still need to work with updating and patching your systems.
13.Jul.2016
Nils Thulin
To work with Vulnerability Management is similar to preventing bad things to happen over time and is basically the exercise of limiting the chance of a breach by remediating vulnerabilities thereby reducing one’s overall risk level of being hacked.
24.May.2016
Nils Thulin
If you had a valuable storage deposit with a fence around it would you not like to know if there was a hole in it?
20.May.2016
Victoria Sigurdsson
Our company already use Firewalls, Intrusion Detection Systems, and other Security Solutions. Why do we need Vulnerability Management?

20.May.2016
Nils Thulin
If you look at your company network as a company car you know that every now and then you will have to drive the car to the motor vehicle inspection.
After the inspection you get a list of what type of defects the car has and how severe the defects are.

Looking for anything in particular?

Type your search word here