2 Sentence Answer to the difference between Nessus and Tenable Nessus is a product that scans for security vulnerabilities in your infrastructure. Tenable is the company that sells the Nessus… Read More »Tenable vs Nessus, what is the difference?
Background Businesses the world over are facing a growing threat of cyber-attacks, with the number of incidents increasing year-on-year in both scale, complexity and impact. One of the major ways… Read More »How crypto-currencies professionalised hacking.
Many organisations may have well defined security policies and processes in place. Processes that respond to vulnerabilities, alerts, and other security gaps in their network and software infrastructure. But these… Read More »Brinqa Risk Based Vulnerability Management for Enterprise Organisations.
The Tenable product portfolio can holistically assess, manage and measure cyber-risk in business terms across a wide range of business sizes and budget. Tenable very much adheres to the principle… Read More »Keeping up-to-date with the Tenable Product Portfolio.
Based upon extensive work with enterprise customers we have compiled a list of eight best practice steps. Follow them for an effective vulnerability management programme. S4 Applications takes a ‘security-by-design’… Read More »8 best practice steps for effective Vulnerability Lifecycle Management.
Cybersecurity threats Today, hackers or cyber criminals are prolific and sophisticated in the methods that they use to attack businesses. Which makes managing cybersecurity a challenge for many organisations. Information… Read More »Vulnerability Scanning vs Penetration Testing
Dealing with cyber-attacks, data breaches and other cyber security issues is something most organisations don’t generally take lightly.
Many businesses react only when they have a problem, there is a better way – by using risk based vulnerability management.Read More »Staying safe with Risk Based Vulnerability Management.
Security is a journey or process, not a thing. It’s not possible to be completely “secure”, but you can become “more secure”. As an organisation goes through a security journey, it can continually improve and enhance its security posture, which it “matures”, hence “security maturity”.
What is security maturity and how can S4 Applications help you enhance your security posture?Read More »Assess your security Posture with our Security Maturity Model.
The Core Impact pricing up until now has been a complex affair (see previous blog post for details). However, from Summer 2020 onwards, Core Systems have radically simplified their pricing. Like… Read More »Core Impact Pricing, from Summer 2020 On