
The importance of Lateral Movement in Defence Plans
In the ever-evolving landscape of cybersecurity, lateral movement remains one of the most underestimated tactics utilised by attackers. While organizations often focus on securing their
The team at Innoculator welcome you to our blog.
In the ever-evolving landscape of cybersecurity, lateral movement remains one of the most underestimated tactics utilised by attackers. While organizations often focus on securing their
As we look back at the cybersecurity landscape over the past few years, it is clear that 2024 stands out as a remarkable year in
What happens when you combine AI with virtual patching? You solve the vulnerability and legacy software problem. Melbourne, Australia – After a year of dedicated
As we here at Innoculator excitedly get ready for our product launch, we thought we would dive a bit deeper into a couple of pertinent
We started this blog at the start of last year with a post titled “We need to talk about Log4J”. With the year coming to
In today’s IT landscape, organizations face a relentless range of cyber threats. To counter these, vulnerability management has become a cornerstone of good cybersecurity management.
In the realm of cybersecurity pen-testing, the Rules of Engagement (ROE) are pivotal for structured, ethical hacking and vulnerability assessments. They specify what can and
Mergers and Acquisitions (M&A) are complex undertakings with significant strategic and operational benefits. However, they also bring with them a host of cybersecurity challenges, particularly
Legacy applications are software systems that have been in use for a long time and are based on outdated/ unpatched software. Despite their age, these
Let me be clear this isn’t a blog about apportioning blame to anyone. These sort of events have happened multiple times in the past, perhaps
Organisations are grappling with the rapid discovery and disclosure of vulnerabilities, creating a complex environment for maintaining their cyber posture. The increasing number of vulnerabilities
Having worked in cyber security for a very long time it has always been an interest to us when we see a data breach get
Time to talk about one of my favourite concepts in cyber security- Honeypots. I don’t know why, but the idea of honeypotting an attacker has
Organisations often choose Java for their applications due to its platform independence, robustness, scalability, and extensive ecosystem of libraries and frameworks. This widespread usage makes
Its time to discuss what tends to be overlooked when it comes to cyber defences for an organisation. What is known in the industry as