trackd_logo_dark-1

The trackd blog

News, stories and insights from the team at trackd

Vulnerability Prioritization

What is Vulnerability Prioritization?

Vulnerability prioritization is the practice of deciding which of the many unpatched vulnerabilities on the typical corporate network should be addressed first because they pose the most cyber risk to the organization. Vulnerability prioritization is

Collective defense in cybersecurity means information sharing to battle the bad guys as a group.

Collective Defense and Patch Management

Collective defense in cybersecurity has been synonymous with threat intelligence sharing for a long time, but a new technology is bringing that concept to the world of patch management.

trackd is re-imagining vulnerability remediation

Google Reviews and Vulnerability Remediation

The internet has enabled us to live in a world where we can all leverage our collective experience to improve our individual decision-making. Just moved to town and need a new dentist? Check candidates out

Identifying vulnerabilities is the first step in the vulnerability management process.

Identify Vulnerabilities

How Do You Identify Vulnerabilities? There are many tools on the market, and even some that are free of charge, that will enable your security or IT team to identify vulnerabilities. Tenable, Qualys, and Rapid

Patch Management Software

What is Patch Management Software? Patch management software is a category of enterprise or business software that helps IT and remediation teams fix vulnerabilities on networks. Fixing – or remediating – vulnerabilities is key to

Patch Management - like dating - can be greatly improved by sharing information.

Cheating Guys and Patch Management (Yup, you read that right.)

Whether we’re talking about sharing indicators of compromise (IoCs) in the cyber security community, Google Reviews of a new restaurant, exposing the bad behavior of potential dating partners, or identifying – before they’re applied – security patches that are most likely to cause disruption, shared information is powerful.

Vulnerability Prioritization

What is Vulnerability Prioritization?

Vulnerability prioritization is the practice of deciding which of the many unpatched vulnerabilities on the typical corporate network should be addressed first because they pose the most cyber risk to the organization. Vulnerability prioritization is

Collective defense in cybersecurity means information sharing to battle the bad guys as a group.

Collective Defense and Patch Management

Collective defense in cybersecurity has been synonymous with threat intelligence sharing for a long time, but a new technology is bringing that concept to the world of patch management.

Solving the IT Staffing Shortage with Automated Patching?

As we enter 2023, it’s a rare day that newsfeeds don’t include stories of companies implementing staff reductions or hiring freezes. Business is clearly preparing for a lean 2023, and it’s likely cybersecurity teams won’t

trackd is re-imagining vulnerability remediation

Google Reviews and Vulnerability Remediation

The internet has enabled us to live in a world where we can all leverage our collective experience to improve our individual decision-making. Just moved to town and need a new dentist? Check candidates out

Identifying vulnerabilities is the first step in the vulnerability management process.

Identify Vulnerabilities

How Do You Identify Vulnerabilities? There are many tools on the market, and even some that are free of charge, that will enable your security or IT team to identify vulnerabilities. Tenable, Qualys, and Rapid

Patch Management Software

What is Patch Management Software? Patch management software is a category of enterprise or business software that helps IT and remediation teams fix vulnerabilities on networks. Fixing – or remediating – vulnerabilities is key to

Ransomware: What is it and how to prevent the next attack.

Ransomware is having a heyday. Increasingly, news about companies and their data being stolen and systems being hacked has made its way into mainstream media. With the growth of ransomware payouts increasing nearly 200% in