Advanced search


Choose Your Armor  

The tools used in attack surface management help identify attack surfaces more precisely and respond to changes in risk situations.

Put Through Their Paces  

We look at one Windows on-board tool, five free tools, and a commercial tool to discover hardware installed on a Windows computer and determine whether it is still working properly.

Safety Dance  

The Purdue Model maps the challenges of networking industrial systems to five levels, helping to target and mitigate risk and address vulnerabilities. We look at the Purdue Model in detail, investigate an implementation tool, and explain the role of zero trust.

Tick It Off  

Checkmk offers a new open source monitoring implementation for network services.