article thumbnail

GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019

The Last Watchdog

IoT security issues will increase. IoT will be deployed in more business usages and scenarios. The risk will rise and eventually this will cause more issues with a few headlines of devices that were used to hack networks.

article thumbnail

Patch Management Policy: Steps, Benefits and a Free Template

eSecurity Planet

Bonus / Nice-to-Have Sections : These sections do not change the core elements of the patch management policy, but can make the policy more usable or comprehensive. Overview : sets expectations and goals for the policy. Top 5 Patch Management Policy Best Practices. How to deal with BYOD and personal equipment.

article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

Vulnerability scanning is the process of scanning IT networks and systems to identify security vulnerabilities in hardware and software. The edge, cloud computing, Internet of Things (IoT) devices, and more have led to a much bigger attack surface and have required new vulnerability scanning approaches and tools.