Skip to main content

Blog

07.Nov.2019
John Stock, Network Security Manager Outpost24
Outpost24 recognized among Vulnerability Risk Management vendors by analyst
10.Sep.2019
By Sergio Loureiro, Product Manager Outpost24
While the idea of a Shared Responsibility Model is conceptually understood, organizations taking advantage of the transformative power of public cloud platforms continue to come short practically, of the implementation of basic security controls, giving hackers a one-way ticket to their critical assets and data.
03.Jul.2019
Simon Roe, Product Manager Outpost24
Penetration testing, or pen tests, can be a confusing subject and the costs can sometimes spiral beyond what you originally budgeted for without adding value. So, is application pen testing an effective way of keeping your critical applications protected or should you look at exploring other options?

There are security experts who insist penetration testing is essential for application security, and you leave yourself open to BIG risks if you don’t do it regularly. However, not knowing the entire end to end process can be a major stumbling block to getting the best value and, crucially, could have a big impact on your bottom line and overall business security.
11.Apr.2019
Davey Winder, security journalist
Cybersecurity is plagued by a surplus of buzzwords, but occasionally there is one which really is worth investigating further; zero-trust definitely falls into this latter category. So, just what is a zero-trust strategy and how do you implement one effectively in your organization?
15.Jan.2019
Outpost24
A Pen Test is an authorized simulated attack on a computer system, performed to evaluate the security of the system with the goal of informing the system owner of both weaknesses and strengths.
18.Sep.2018
Outpost24 France
The PCI Security Standards Council touches the lives of hundreds of millions of people worldwide. A global organization, it maintains, evolves and promotes Payment Card Industry standards for the safety of cardholder data across the globe.
09.Feb.2018
Fernando Gallego, IT Security at Outpost24
In the digital age, web application penetration testing is one of the most critical elements of an organization’s vulnerability management program. In this blog post we will explain the role of penetration testing plays in protecting your organization against web-related exploitations
02.Jan.2018
Simon Roe, Product Manager at Outpost24
The second part of the OWASP Top 10 2013/17 comparison list with tips and advice to remediate vulnerabilities such as sensitive data exposure, broken access controls, security misconfigurations and cross site scripting (XSS).
24.Aug.2017
SecludIT, now part of Outpost24
Learn more about our Top 10 Microsoft Azure security best practices to continuously secure your cloud environment from cyber-attacks.
16.Jun.2017
SecludIT, now part of Outpost24
Build and improve your DevOps Cycle with an innovative cloud security solution: Elastic Workload Protector. Detect all your cloud vulnerability with our all-in-one solution

Looking for anything in particular?

Type your search word here