Our Blog

The team at Innoculator welcome you to our blog.

Vuln Mngt is Broken

Is Vulnerability Management Broken?

In today’s IT landscape, organizations face a relentless range of cyber threats. To counter these, vulnerability management has become a cornerstone of good cybersecurity management.

legacy Applications

The Conundrum of Legacy Applications

Legacy applications are software systems that have been in use for a long time and are based on outdated/ unpatched software. Despite their age, these

Recent events and the Patch Gap

Recent Events & the Patch Gap

Let me be clear this isn’t a blog about apportioning blame to anyone. These sort of events have happened multiple times in the past, perhaps

Honeypot

The Joys of Honeypotting

Time to talk about one of my favourite concepts in cyber security- Honeypots. I don’t know why, but the idea of honeypotting an attacker has

The Patch Gap

Mind the Patch Gap

Its time to discuss what tends to be overlooked when it comes to cyber defences for an organisation. What is known in the industry as

Know your Signatures

Lets start at the basics, Network IPS and IDS – Intrusion Prevention and Detection. IPS usually sits inline with the traffic flow and allows packets

Accepting Risk

Accepting the Risk

In the cyber security industry a phrase gets used when looking at legacy applications – “Accept the Risk”. This is often said when it comes

Healthcare Legacy Apps

Thoughts on Healthcare and Legacy Systems

In the realm of healthcare, where the stakes involve not just the operational efficiency of providers but the very well-being and privacy of patients, the

Log4J legacy

We Need to Talk about Log4J

CVE-2021-44228 (AKA Log4J) was released in December 2021, and remains one of the most exploited vulnerabilities still 2 years later! How can this be? What