Our Blog
Home / Blog

IT Compliance and Audit reports and more in Device42 v16.21.01
Update Overview As part of our ongoing commitment to product improvement and customer support, we are pleased to announce the release of v16.21.01, which includes a collection of new reports to help identify and remediate compliance issues in customers’ environments....

Managing IBM Cloud Paks and Overcoming Increasing Complexity
Companies may have full awareness of their on-premises and SaaS applications. But what happens when cloud capabilities such as IBM Cloud Paks are added to their environment? While it can make companies more agile, the cloud adds complexity to the computing...

What Makes a Security Product a Solution?
Product, solution, what’s the difference? We’ve all seen and heard these terms used interchangeably, especially in marketing. Yet there is a huge difference between buying a product and getting actual benefits out of it, especially with software and especially in...

Scanning Authenticated Web Assets with the Login Sequence Recorder
Most web applications and websites require some form of authentication – either as a whole or in an area. Many web vulnerability scanners struggle with such authenticated web assets. While some scanners are able to detect standard authentication forms and mechanisms,...

Tinker Tailor Soldier Sam
The year is 1973. It is the height of the Cold War and a botched assignment to uncover the name of a Soviet mole planted at the top of British Intelligence leads to a high-stakes trail of mystery, deception and intrigue. Nobody can be trusted, nothing is truly as it...