Remove Article Remove IoT Remove Phishing Remove Policy Compliance
article thumbnail

GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019

The Last Watchdog

Still, Ransomware, zero-day exploits, and phishing attacks, were among the biggest threats facing IT security teams this year. IoT security issues will increase. IoT will be deployed in more business usages and scenarios. Editor’s note: This article also appeared on Portnox Point).

article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

The edge, cloud computing, Internet of Things (IoT) devices, and more have led to a much bigger attack surface and have required new vulnerability scanning approaches and tools. Some SCM tools can scan devices and networks for vulnerabilities, track remediation actions, and generate reports on security policy compliance.