Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.

View Cookie Policy for full details

Naveen Bibinagar  

Gone Phishing: A Case Study on Conducting Internal Phishing Campaigns

To many, emails are boring. It’s been a long time since they were ‘cool,’ and they’re probably the slowest form of communication in an evolving fast-paced digital world. Nevertheless, there were 215 billion emails exchanged per day in 2016, and that number is…

ControlsInsight: Server Controls - Single Critical role

NIST CM-7, Australian DSD Mitigation #24, SANS critical control 11-6 and PCI-DSS 2.2.1 suggest that servers deployed in a production environment must only be serving one critical role. For example, if we add another critical role like file services to a web server…

ControlsInsight: A step-by-step approach to troubleshoot missing assets

ControlsInsight retrieves data from Nexpose, so it is important to make sure that the site is properly configured. In this blog post, we will go through a step-by-step procedure of setting up a site configuration that will enable ControlsInsight to report on all Windows assets.…

Customer triggered assessments

In 2013 Q4, ControlsInsight is going to enable customers to reassess their sites based on the changes on the site-import screen. Currently, when customers need to generate a new assessment based on the newly selected or deselected sites, they need to perform a scan on…

Asset search: assets cannot hide anymore!

As ControlsInsight starts reporting on 100's and 1000's of assets, it becomes a tedious task to locate few assets that were recently managed by the IT admins. To make life easier, ControlsInsight provides a search box on the top right side that let you search…

Never miss a blog

Get the latest stories, expertise, and news about security today.