article thumbnail

GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019

The Last Watchdog

Still, Ransomware, zero-day exploits, and phishing attacks, were among the biggest threats facing IT security teams this year. About the essayist : Ofer Amitai is CEO of Portnox, which supplies network access control, visibility, management and policy compliance systems designed to help today’s complex networks run smoothly and securely.

article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

Some SCM tools can scan devices and networks for vulnerabilities, track remediation actions, and generate reports on security policy compliance. Read next: Vulnerability Management as a Service (VMaaS): Ultimate Guide This updates an April 5, 2019 article by Paul Rubens The post What is Vulnerability Scanning & How Does It Work?