cover

Kent Weigle

What is Risk-Based Vulnerability Management?

Risk-based vulnerability management is the process of reducing vulnerabilities across the attack surface of an organization’s assets by prioritizing remediation based on the risks they pose. 

In: #patching

Vicarius & Log4Shell: What You Need to Know

Has Vicarius Been Affected by Log4Shell?

Along with the rest of the cybersecurity community, we have been continuously monitoring for any evidence of Log4Shell exploit attempts in our digital environment. So far, we have found no evidence that TOPIA or any of our systems have been affected by CVE-2021-44228 or CVE-2021-45046. It is also our current understanding that we are not vulnerable to either CVEs according to data gathered from extensive testing.

In: #cve

Nmap Best Practices

What is Nmap?

Nmap is one of the most popular free network scanning tools available on the market today. For many years, the software has become a core program for network administrators and IT professionals who want to map out their network and conduct a wide range of network inventories. It also allows the user to find live hosts on their network systems and scan for open ports and operating systems. 

In: #security

Vicarius Launches MacOS Patching Capability

There’s a patch for that.

In: #patching

Is Nmap Safe?

Nmap is a network scanning tool that can scan large networks as well as single hosts quickly. Network administrators normally use it to identify the devices that are currently running on the system, the port number on which the devices are connected and the free ports that can be used.

In: #security

Top Nmap Commands for System Admins

Network Mapper (Nmap) is an open-source Linux command-line tool for network exploration and security auditing. With Nmap, server administrators can reveal services and hosts quickly, scan for open ports and search for security issues. The Nmap tool can assess and discover local and remote open ports as well as network information and hosts.

In: #security

How to Use Nmap

The most common issue with Internet systems is that they are too complex for the ordinary person to understand. Also, a small home-based system may be complex for some people. Consequently, when it comes to bigger agencies and large organizations that deal with lots of computers on the network, the complexity will increase.

Therefore, to learn which ports are open and the rules of engagement, a program called Nmap can be used. It’s a network scanning tool available for IT administrators, network administrators, systems administrators and other IT professionals. 

In: #security

What is Nmap?

Nmap is one of the most used tools for network scanning. Its ease of use and effective installation with exceptional scanning options makes it popular in the IT industry. This article will give you a comprehensive understanding of the tool and let IT professionals, IT administrators and network administrators scan networks with ease to discover vulnerabilities.

In: #security

Leave a Reply

    Categories

    See all

    Strong Cyber Hygiene is only One Click Away

    Want to take TOPIA for a free ride? Schedule A Meeting with our 🐺team!

    Let us know what would like to see 😀