Fortra expands Offensive Security capabilities with the acquisition of Red Macros Factory.
Fortra has acquired and strategically integrated Red Macros Factory (RMF), an Initial Access Framework.
Fortra has acquired and strategically integrated Red Macros Factory (RMF), an Initial Access Framework.
When Security Audits Fail: A Wake-Up Call A failed security audit or a material breach is more than just a compliance issue—it’s a sign that your cybersecurity defences may not… Read More »Turning Failure into Cyber Resilience
Going back a few years, all pen-tests were done manually, there are now a growing number of tools that are automatic pen-test tools. In this blog we will discuss the… Read More »Automatic vs Manual Pen-Tests
The “High Level” Overview of Tenable & Vicarius So, if you are reading this I am guessing that you are thinking about implementing (or updating) a vulnerability management (VM) programme… Read More »Tenable vs Vicarius explained
A short summary on the differences between Nessus and Tenable Nessus is a product that scans for security vulnerabilities in your infrastructure, with prices starting at just a few thousand… Read More »Tenable vs Nessus, what is the difference?
Background Businesses the world over are facing a growing threat of cyber-attacks, with the number of incidents increasing year-on-year in both scale, complexity and impact. One of the major ways… Read More »How crypto-currencies professionalised hacking.
Many organisations may have well defined security policies and processes in place. Processes that respond to vulnerabilities, alerts, and other security gaps in their network and software infrastructure. But these… Read More »Brinqa Risk Based Vulnerability Management for Enterprise Organisations.
The Tenable product portfolio can holistically assess, manage and measure cyber-risk in business terms across a wide range of business sizes and budget. Tenable very much adheres to the principle… Read More »Keeping up-to-date with the Tenable Product Portfolio.
Based upon extensive work with enterprise customers we have compiled a list of eight best practice steps. Follow them for an effective vulnerability management programme. S4 Applications takes a ‘security-by-design’… Read More »8 best practice steps for effective Vulnerability Lifecycle Management.
New to security? Want the 2 line summary? Vulnerability scans are easier, cheaper and less risky than a pen test, but they find mostly the same things. For this reason… Read More »Vulnerability Scanning vs Penetration Testing