User Activity

16 days ago
Tools are not necessarily bogus. Sometimes they are just 'legacy' tools that have been around for too long and no longer fit the problem they were designed to solve, simply because IT infrastructure, organizational needs, and cybersecurity threat complexity have evolved. 
5 months ago
Patching is the cornerstone of cyber hygiene. Due to the sheer volume of new vulnerabilities, the only way to achieve security is by using intelligence and automation in the patching process. Thus, every organization must remediate vulnerabilities on a regular basis to…