Our Blog
Home / Blog
ENHANCED BUSINESS APPLICATION FUNCTIONALITY AND MORE IN V17.02.00
Update Overview As part of our effort to expand application dependency analysis for our customers, Device42 v17.02.00 includes enhancements to our Business Application functionality and editing canvas. v17.02.00 also includes updates to storage array and SNMP...
Make application readiness a part of your IT ecosystem
Do you have a Windows migration coming up? You’ve already done that? Then all your application packaging needs are done and you can just forget about your applications. Just kidding. Tending to the updates necessary for existing applications need just as much love (or...
What Biden’s executive order on cybersecurity means for web application security
The US government is rethinking its cybersecurity approach after recent high-profile cyberattacks. President Biden’s executive order from May 12th lays down some ambitious and noble goals to help protect agencies against current threats and bring them into the...
Malware family naming hell is our own fault
EternalPetya has more than 10 different names. Many do not realize that CryptoLocker is long dead. These are not isolated cases but symptoms of a systemic problem: The way we name malware does not work. Why does it happen and how can we solve it? Current state of...
The Digital Workspace in the Era of Cloud and Edge
The digital transformation poses major challenges for IT departments. Their tasks only become more complex in the face of flexible working conditions and the increase in the number of people working from home. And why is that? The IT department manages more than just...