The Importance of Benchmarking Vulnerability Management

Introduction:Benchmarking your cybersecurity posture is crucial for staying ahead in the ever-evolving landscape of cyber threats. By comparing your performance against industry benchmarks, you gain valuable insights and improve your overall security strategy. In this expert paper, we explore the…

Read More

World Backup Day: Best practices for small to mid-sized companies

Thinking of best practices for data backup, we constantly hear phrases like ‘data is the new oil’ — and just like oil it needs to be stored carefully. According to research commissioned by Arcserve, 52% of mid-sized companies that have…

Read More
Vulnerability-Management-issue-digestion

That little extra for your vulnerability management

In this article, you will learn what is so special about Autobahn Security's Issue Digestion and why this process plays an essential role in a realistic assessment of your security posture. That little extra for your vulnerability management. Vulnerability management…

Read More
Penetration testing-vulnerability scanning

Penetration test or vulnerability scan: what’s the difference?

The ProblemThe danger posed by hackers seems infinite in today's digital world. The frequency of which companies are affected by cyber-attacks is increasing. This blog article explores the methods of penetration testing and vulnerability scanning.​The trend is still rising, because…

Read More
The picture shows two cars being benchmarked against each other, one is old and rust, and the other one is a newer and cleaner version of the same car. The photo depicts the importance of comparing cyber security posture over time. It is attached to an article explaining 5 easy steps companies can follow to benchmark their cybersecurity posture.

5 Easy Steps for Benchmarking Cyber Security

Why benchmark your cyber security?Are you benchmarking everything except your cybersecurity KPIs? You could be missing out on vital information.In this expert paper, we examine how benchmarking your cybersecurity posture can benefit you by following these 5 steps:Helping your organization…

Read More
World backup day cover photo. The photo is attached to a blog article about world Backup Day explaining best practices for small to mid-sized companies

World Backup Day: Best practices for small to mid-sized companies

We constantly hear phrases like ‘data is the new oil’ — and just like oil it needs to be stored carefully. According to research commissioned by Arcserve, 52% of mid-sized companies that have experienced data loss in the last five…

Read More
A person’s hand is shown stacking wooden blocks with the numbers one through five on them in a staircase pattern to depict the step-by-step approach for choosing a vulnerability scanning software

How to choose a vulnerability scanning software

SummaryA vulnerability scanner, also known as vulnerability management software or vulnerability assessment software, is a tool used to scan computer systems and networks for security vulnerabilities. In this article, we will break down how to choose a vulnerability scanning software.Vulnerability…

Read More
A picture of a guy holding a magnifier

Internet-facing asset discovery: what is it and how does it help me?

Explore internet-facing asset discovery to protect your business by identifying and securing exposed online assets. Ransomware, state-directed cybercriminals and the dark web gangs — in today's world, it's crucial for companies to safeguard their assets from cyber threats. Ensuring the…

Read More
A picture of a payment terminal depicting outdated payment protocols exposing customers and merchants.

Outdated payment protocols expose customers and merchants

We must be able to trust payment systems: Payment terminals have conquered nearly every retail outlet and payment cards are as pervasive as cash. Major parts of this critical payment infrastructure, however, rely on proprietary protocols from the 90’s with…

Read More
zero-day vulnerabilities

Achieving Telerik Remote Code Execution 100 Times Faster

Abstract ‍A cryptographic vulnerability in the development software Telerik UI that was discovered in 2017 has long been considered impractical to exploit. Until now. Research by Security Research Labs (SRLabs) shows that this impracticability was only due to the unoptimized…

Read More