Our Blog

The team at Innoculator welcome you to our blog.

Lateral movement

The importance of Lateral Movement in Defence Plans

In the ever-evolving landscape of cybersecurity, lateral movement remains one of the most underestimated tactics utilised by attackers. While organizations often focus on securing their

Innopculator Released

Innoculator version 1.0 released

What happens when you combine AI with virtual patching? You solve the vulnerability and legacy software problem. Melbourne, Australia – After a year of dedicated

Log4j still

We STILL need to talk about Log4j

We started this blog at the start of last year with a post titled “We need to talk about Log4J”. With the year coming to

Vuln Mngt is Broken

Is Vulnerability Management Broken?

In today’s IT landscape, organizations face a relentless range of cyber threats. To counter these, vulnerability management has become a cornerstone of good cybersecurity management.

legacy Applications

The Conundrum of Legacy Applications

Legacy applications are software systems that have been in use for a long time and are based on outdated/ unpatched software. Despite their age, these

Recent events and the Patch Gap

Recent Events & the Patch Gap

Let me be clear this isn’t a blog about apportioning blame to anyone. These sort of events have happened multiple times in the past, perhaps

Honeypot

The Joys of Honeypotting

Time to talk about one of my favourite concepts in cyber security- Honeypots. I don’t know why, but the idea of honeypotting an attacker has

The Patch Gap

Mind the Patch Gap

Its time to discuss what tends to be overlooked when it comes to cyber defences for an organisation. What is known in the industry as