
Innoculator version 1.0 released
What happens when you combine AI with virtual patching? You solve the vulnerability and legacy software problem. Melbourne, Australia – After a year of dedicated
The team at Innoculator welcome you to our blog.

What happens when you combine AI with virtual patching? You solve the vulnerability and legacy software problem. Melbourne, Australia – After a year of dedicated

As we here at Innoculator excitedly get ready for our product launch, we thought we would dive a bit deeper into a couple of pertinent

We started this blog at the start of last year with a post titled “We need to talk about Log4J”. With the year coming to

In today’s IT landscape, organizations face a relentless range of cyber threats. To counter these, vulnerability management has become a cornerstone of good cybersecurity management.

In the realm of cybersecurity pen-testing, the Rules of Engagement (ROE) are pivotal for structured, ethical hacking and vulnerability assessments. They specify what can and

Mergers and Acquisitions (M&A) are complex undertakings with significant strategic and operational benefits. However, they also bring with them a host of cybersecurity challenges, particularly

Legacy applications are software systems that have been in use for a long time and are based on outdated/ unpatched software. Despite their age, these

Let me be clear this isn’t a blog about apportioning blame to anyone. These sort of events have happened multiple times in the past, perhaps

Organisations are grappling with the rapid discovery and disclosure of vulnerabilities, creating a complex environment for maintaining their cyber posture. The increasing number of vulnerabilities

Having worked in cyber security for a very long time it has always been an interest to us when we see a data breach get

Time to talk about one of my favourite concepts in cyber security- Honeypots. I don’t know why, but the idea of honeypotting an attacker has

Organisations often choose Java for their applications due to its platform independence, robustness, scalability, and extensive ecosystem of libraries and frameworks. This widespread usage makes

Its time to discuss what tends to be overlooked when it comes to cyber defences for an organisation. What is known in the industry as

Lets start at the basics, Network IPS and IDS – Intrusion Prevention and Detection. IPS usually sits inline with the traffic flow and allows packets

In the cyber security industry a phrase gets used when looking at legacy applications – “Accept the Risk”. This is often said when it comes