Skip to main content

Blog

17.Dec.2018
Outpost24
There can be no disputing that 2018 has been a big year for cybercrime. Between the huge data breaches affecting some of the world’s leading airlines, and the global cost of ransomware exceeding $8 billion, cybercriminals did not show any signs of slowing down. So what does 2019 have in store for us?
05.Dec.2018
John Stock, Network Security Product Manager
Power BI is a business analytics service that delivers insights to enable fast, informed decisions. Discover how can Microsoft Power BI add clarity to your vulnerability data
03.Dec.2018
Outpost24
Looking back over the years and what we see happening now is the same attack vectors being used that have led to breaches. Web applications and the human element of security remain the cornerstones when it comes to protecting your organization against any weak spots. Your organization’s ever-expanding digital footprint and supply chains are also factors adding to this risk, which cyber criminals are aware of and willing to exploit.
18.Sep.2018
Outpost24 France
The PCI Security Standards Council touches the lives of hundreds of millions of people worldwide. A global organization, it maintains, evolves and promotes Payment Card Industry standards for the safety of cardholder data across the globe.
01.Aug.2018
Sergio Loureiro, Director Cloud solutions
What about our patented Clone&Scan technology? Discover a new approach for Vulnerability Scanning: the Clone Wars!
26.Jun.2018
Outpost24 France
Only 57 percent of organisations patch vulnerabilities as soon as they are known. What about you?
16.Mar.2018
Outpost24 France
Why carry out a cyber security risk assessment? Because company cybersecurity risks are increasing very fast when they haven't smart action plan.
12.Mar.2018
Outpost24
A vulnerability assessment is a risk management process used to identify, quantify and rank possible vulnerabilities to threats in a given system.
04.Jan.2018
Srinivasan Jayaraman, Vulnerability Research Manager
CPU bugs Meltdown and Spectre were discovered earlier this week which could allow hackers to read sensitive information stored in a system's memory. Find out what they are and what can be done about these widespread vulnerabilities
21.Dec.2017
Simon Roe, Product Manager at Outpost24
In December 2017 several security researchers discovered that an old vulnerability – namely the Bleichenbachers Oracle Threat had resurfaced after first being discovered 19 years ago in 1989. This recurring vulnerability, now called ROBOT, affects the TLS (Transport Layer Protocol) in a way that could lead to the disclosure of private information caused by discrepancies between valid and invalid PKCS#1 padding.

Looking for anything in particular?

Type your search word here