reba_wpadmin

About reba_wpadmin

This author has not yet filled in any details.
So far reba_wpadmin has created 15 blog entries.

Embracing the Future of Vulnerability Management: Insights for IT Security Leaders 

In the ever-evolving landscape of cybersecurity, the surge in vulnerabilities continues to accelerate, demanding a strategic and adaptive approach from organisations. As a leader responsible for IT security, you understand the critical importance of managing and prioritising vulnerabilities effectively in alignment with your organisational priorities. In this article, we delve into three pivotal trends that are shaping the future of Vulnerability Management and discuss how Rebasoft is at the forefront of addressing these challenges.  Trend 1: Asset Management and [...]

2023-09-04T09:35:16+00:00September 4, 2023|

Press Release: The Future is Asset Based Vulnerability Management

Rebasoft, a UK systems developer, is extending its real-time, agent-less cybersecurity platform with integrated vulnerability management. This integration of vulnerability management with real-time asset management enables small and medium-sized businesses to improve their cybersecurity without the high costs and complexity associated with traditional systems. Rebasoft's asset and vulnerability solution provides comprehensive coverage for the entire IT infrastructure without installing agents, including endpoints, network devices, infrastructure, and IoT devices. This agentless approach simplifies the installation process and allows businesses to [...]

2023-08-24T11:57:53+00:00August 24, 2023|

Newsletter June

Note from the Managing Director – Philip Harragan As we reached the end of May, nearly 7,500 vulnerabilities have already been reported (source: Statista), which means we are on track to surpass the record-breaking number from 2022. Threat actors continued to exploit older vulnerabilities in unpatched systems, causing the IT team’s headache to get bigger and increasingly difficult to manage. So, what core actions can they take to help mitigate the risk posed? Know your assets, know your vulnerabilities. [...]

2023-06-27T11:50:21+00:00June 27, 2023|

IT Hardware, Software & Vulnerability Audit: Not just for Christmas

IT Hardware, Software & Vulnerability Audit: Not just for Christmas This blog explores the concept of IT hardware, software and vulnerability audit. It highlights their crucial role in an organisation's IT security strategy, compliance with regulations, cyber security framework accreditation, and business insurance policies related to cyber security coverage. It emphasises the benefits and outcomes of such audits and argues for adopting real-time, always-on audits as a standard practice for IT teams. Introduction In today's digital landscape, businesses rely heavily [...]

2023-06-07T12:46:41+00:00June 7, 2023|

The Critical Role of Vulnerability Management in Network Security Strategy

The Critical Role of Vulnerability Management in Network Security Strategy   In today's digital landscape, a robust network security is paramount for organisations to protect their sensitive data and maintain customer trust. An effective network security strategy requires a proactive approach that addresses vulnerabilities before they can be exploited. This is where vulnerability management comes into play. In this blog post, we will delve into the importance of vulnerability management in network security and its crucial role in achieving [...]

2023-06-09T11:48:32+00:00June 5, 2023|

Newsletter May

Channel Newsletter - May 23' Since 2009 Rebasoft, a leading UK-based software solutions company delivering agentless asset management, secure compliance and vulnerability management from a single platform to help organisations gain full visibility, control and secure their networks whilst achieving and maintaining compliance standards, has announced its commitment and investment into a channel-first strategy. Rebasoft hires new channel sales leader Kevin Monk has recently joint the team at Rebasoft to lead channel engagement across the EMEA region. Monks bring [...]

2023-06-07T10:45:20+00:00June 2, 2023|

Misconceptions about Vulnerability Management

Vulnerability management is one of the most important cyber security tasks. But it is also tricky and complex, giving rise to dangerous misconceptions which can lead to misguided practices and ineffective security. When it comes to communicating vulnerabilities, risks and threats to senior management, misconceptions can greatly harm communication and have a knock-on effect to your security strategy. Don't let the myths stand in your way, get the facts and sharpen your security. Myth 1. Vulnerability management and patch management [...]

2023-05-30T10:34:04+00:00May 30, 2023|

How dangerous is the mysterious Rorschach ransomware?

Researchers uncover a new strain of malware with unusual features Check Point Research (CPR) uncovered a mysterious, new strain of ransomware. What stands out most, is that it's completely unbranded, very unusual for the ransomware ecosystem where reputation is everything. It also boasts faster encryption speeds than any other strain before and has rare, unusual features compared to others. What do you see in the inkblots? This new strain of ransomware is unusually customisable, allowing users to deploy it how [...]

2023-04-18T14:40:35+00:00April 18, 2023|

Why you should take a risk-based approach to cyber security

The checklist mentality According to the WEF (World Economic Forum) Global Cyber Security Outlook 2023, attitudes have shifted, with many now seeing cyber security frameworks as an effective tool for improving cyber security accross the private sector. Following a cyber security framework such as Cyber Essentials or ISO 27001 has been shown to reduce the chances of a data breach by up to 86%. But it's a double edged sword. Now, many people think of cyber security and security standard [...]

2023-04-18T09:52:50+00:00April 17, 2023|

Why you shoud go agentless in 2023

Why 2023 is the year to go agentless We are in the age of digital transformation projects, migrations to the cloud, remote working and IoT (Internet of Things). It's a crisis of complexity. Network growth is accelerating and security is struggling to stay on top. Attackers always have the advantage - just one gap in your defences is enough for them to get in. The more complex your IT becomes, the more gaps attackers can find and the easier you [...]

2023-06-13T15:06:27+00:00April 14, 2023|