Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages. In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information […]

Read more

Insiders are responsbile for some of the most common threats within a company. This week saw a former NSA employee sentenced for taking home classified documents. Click here. With the transition to a digital environment in healthcare, outdated legacy systems remain a hurdle which can cause damage and endanger patient safety. Read more here. Security is […]

Read more