Inventory
The 4 Most Important Components of Security Posture (Part 1 – Asset Inventory)
Most breaches happen because organizations only have a vague understanding of their security posture. That said, getting an accurate and up-to-date view of your attack surface and posture is no easy feat ...
Remote Vulnerable Laptops – fertile attack targets
What 3rd party apps do remote workers have installed? Remote workers are nothing new, but the challenge of hunting down employees on-the-go and assessing these devices can be a task in and ...