Our Blog
Home / Blog

Microsoft Exchange exploits – step one in ransomware chain
Once attackers gain a foothold on web servers, there are all manner of nasty tricks and malware they can leverage immediately or put into play later – like ransomware.Since the research blogpost – Exchange servers under siege from at least 10 APT groups – ESET has...

Ransomware in a virtual environment
Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware. Although it significantly reduces some cyberthreat risks, virtualization is no more a panacea than any single other practice. A ransomware attack can still...

4 Horrible Mistakes You’re Making with It Asset Management
A good IT asset manager is great at demonstrating the value the IT department provides to the organization as a whole. Effective IT asset management (ITAM) enables the IT department to make smarter decisions by optimizing equipment and creating positive forward...

When good intentions, good will and sincerity lead to licensing nightmares and financial waste
Working for 20 years in SAM, I have come to the conclusion that the best efforts from everybody to reach high performance of IT infrastructure and fair licensing rules leads to incredible complexity in SAM, stress for SAM teams and over spend in licenses. Licensing...

Incident Response Steps in Web Application Security
Just when news reports about individual data breaches were starting to get predictable, we got SolarWinds. And then Accellion. And Exchange Server. In a world where the next cybersecurity incident is only a matter of time, having a solid web incident response plan is...