Our Blog
Home / Blog
Strategies and Use Cases for Private Cloud Security
When cloud migration originally started, some organizations often adopted public cloud services because the costs for operating, designing, and maintaining private cloud deployments seemed unsustainable. However, as cyber criminals increasingly target public cloud...
Endpoint detection and response: The path to security maturity starts with visibility
Looking to set off on the right foot with endpoint detection and response? Prioritize visibility into your systems.For organizations considering adoption of an endpoint detection and response (EDR) solution, MITRE Engenuity’s most recent ATT&CK® Evaluation...
A trick auction to steal gold in World of Warcraft
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second. When scammers target gamers, they are typically pursuing gaming accounts. Today, we’re discussing a different target: players’ gold. As games go, the massively...
NEW AFFINITY GROUP AND DATABASE CONNECTIVITY WIDGETS, AWS ROLES EDITOR FOR AWS CLOUD AUTODISCOVERY AND MORE IN V17.03.00
Update Overview Device42 v17.03.00 includes new Affinity Group and Database Connectivity dashboard widgets to give you additional visual insight into your ADM environment. And as part of our ongoing improvements to cloud autodiscovery, v17.03.00 includes a new AWS...
2021 State of Tech Spend: IT Spending Benchmarks and Trends
Today we report the results from the second annual Flexera 2021 State of Tech Spend Survey to identify the latest IT spending benchmarks and trends. This report is based on responses from more than 474 enterprise CIOs and IT executives who are driving digital...