privileged access

Data breach at the border. Are your subcontractors an easy target?

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if …

Data breach at the border. Are your subcontractors an easy target? Read More »

Agent or Agentless approach?

Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages. In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information …

Agent or Agentless approach? Read More »

Solverwp- WordPress Theme and Plugin