Skip to main content


Rafael Alfaro
A web application including authentication usually allows the user access to various types of information. By the same token, several web applications provide advanced features that are assigned through different access levels.
SecludIT, now part of Outpost24
Companies are switching from reactive to proactive security. The first step in being proactive is to identify risks with KPI and KRI audits.
Niels Schweisshelm
Imagine heading to the office on Monday morning. The company you work for has been breached during the weekend and it’s your responsibility to notify the board members. You scroll through the e-mails you received from the security engineers and it turns out that an attacker has successfully compromised the enterprise network.
SecludIT, now part of Outpost24
Technology is one of the most important, if not the most important, driver of change for organizations. But IT has risks within risks which can hold back the forward thinking enterprise
Nils Thulin
You hear about security issues and breaches so often that you have almost stopped listening to it ..until you are targeted by an attacker. It is actually not that hard to raise the bar if everyone just would do the basic security measures we would not hear so much about security issues.
Nils Thulin
here are still serious exploits from 2010 that are not patched today...and even though solutions exists; a lot of organizations have not remediated those exploits why one should focus on Patch Management.
Nils Thulin
Data breaches are nowadays a common factor risk but there are ways to reduce the risk. Know your assets and get on top of your infrastructure, even if you have Signature-Based Defences and Content-Based Protection you still need to work with updating and patching your systems.
Nils Thulin
To work with Vulnerability Management is similar to preventing bad things to happen over time and is basically the exercise of limiting the chance of a breach by remediating vulnerabilities thereby reducing one’s overall risk level of being hacked.
Nils Thulin
If you had a valuable storage deposit with a fence around it would you not like to know if there was a hole in it?
Victoria Sigurdsson
Our company already use Firewalls, Intrusion Detection Systems, and other Security Solutions. Why do we need Vulnerability Management?

Looking for anything in particular?

Type your search word here