Based upon extensive work with enterprise customers we have compiled a list of eight best practice steps. Follow them for an effective vulnerability management programme. S4 Applications takes a ‘security-by-design’… Read More »8 best practice steps for effective Vulnerability Lifecycle Management.
New to security? Want the 2 line summary? Vulnerability scans are easier, cheaper and less risky than a pen test, but they find mostly the same things. For this reason… Read More »Vulnerability Scanning vs Penetration Testing
Dealing with cyber-attacks, data breaches and other cyber security issues is something most organisations don’t generally take lightly.
Many businesses react only when they have a problem, there is a better way – by using risk based vulnerability management.Read More »Staying safe with Risk Based Vulnerability Management.
Security is a journey or process, not a thing. It’s not possible to be completely “secure”, but you can become “more secure”. As an organisation goes through a security journey, it can continually improve and enhance its security posture, which it “matures”, hence “security maturity”.
What is security maturity and how can S4 Applications help you enhance your security posture?Read More »Assess your security Posture with our Security Maturity Model.
This blog has been superseded; the current version is available here. The Core Impact pricing up until now has been a complex affair (see previous blog post for details). However, from… Read More »Core Impact Pricing from Summer 2020 On
Core Impact is considered a weapon by the US government and the government doesn’t want this tool used against it, or American companies. For this reason it imposes the requirement… Read More »Why do you need an Export License for Core Impact?
The Tenable portfolio continues to grow with a number of products and modules, in this short blog post we aim to position each one and the relevant merits. Consultant tools… Read More »The Tenable Product Portfolio Explained
Whilst most companies seek to run a risk-based vulnerability management programme, it is very hard to implement one from scratch. Most companies do this using the following 3 steps, by… Read More »Steps for Risk Based Vulnerability Management