trackd_logo_dark-1

The trackd blog

News, stories and insights from the team at trackd

Identifying vulnerabilities is the first step in the vulnerability management process.

Identify Vulnerabilities

How Do You Identify Vulnerabilities? There are many tools on the market, and even some that are free of charge, that will enable your security or IT team to identify vulnerabilities. Tenable, Qualys, and Rapid

Patch Management Software

What is Patch Management Software? Patch management software is a category of enterprise or business software that helps IT and remediation teams fix vulnerabilities on networks. Fixing – or remediating – vulnerabilities is key to

trackd is bringing crowdsourcing and collective defense to vulnerability remediation and patch management

trackd Secures $3.35MM Seed Funding to Bring Its Novel Approach to Vulnerability Remediation to the Enterprise Security Market

“Innovation in vulnerability management has been scarce over the past decade, and trackd is blowing up that narrative with a solution that we believe can have a material impact on remediation timeframes,” noted Geoff Gilton SVP, Technology at Service Credit Union, an early adopter and design partner. “We’re excited to be part of the process to bring this technology to the infosec community.”

The FutureCon Show in Chicago was trackd's first ever.

Observations From Our First Show (FutureCon)

There’s a new IT generation emerging in the manufacturing world. We had a few conversations with young IT professionals eagerly anticipating the imminent retirement of legacy IT leadership that lived in a world where IT and security were necessary evils, chronically underfunded, and an afterthought.

Patch Management - like dating - can be greatly improved by sharing information.

Cheating Guys and Patch Management (Yup, you read that right.)

Whether we’re talking about sharing indicators of compromise (IoCs) in the cyber security community, Google Reviews of a new restaurant, exposing the bad behavior of potential dating partners, or identifying – before they’re applied – security patches that are most likely to cause disruption, shared information is powerful.

Vulnerability Prioritization

What is Vulnerability Prioritization?

Vulnerability prioritization is the practice of deciding which of the many unpatched vulnerabilities on the typical corporate network should be addressed first because they pose the most cyber risk to the organization. Vulnerability prioritization is

Collective defense in cybersecurity means information sharing to battle the bad guys as a group.

Collective Defense and Patch Management

Collective defense in cybersecurity has been synonymous with threat intelligence sharing for a long time, but a new technology is bringing that concept to the world of patch management.

Solving the IT Staffing Shortage with Automated Patching?

As we enter 2023, it’s a rare day that newsfeeds don’t include stories of companies implementing staff reductions or hiring freezes. Business is clearly preparing for a lean 2023, and it’s likely cybersecurity teams won’t

trackd is re-imagining vulnerability remediation

Google Reviews and Vulnerability Remediation

The internet has enabled us to live in a world where we can all leverage our collective experience to improve our individual decision-making. Just moved to town and need a new dentist? Check candidates out

Identifying vulnerabilities is the first step in the vulnerability management process.

Identify Vulnerabilities

How Do You Identify Vulnerabilities? There are many tools on the market, and even some that are free of charge, that will enable your security or IT team to identify vulnerabilities. Tenable, Qualys, and Rapid

Patch Management Software

What is Patch Management Software? Patch management software is a category of enterprise or business software that helps IT and remediation teams fix vulnerabilities on networks. Fixing – or remediating – vulnerabilities is key to

Ransomware: What is it and how to prevent the next attack.

Ransomware is having a heyday. Increasingly, news about companies and their data being stolen and systems being hacked has made its way into mainstream media. With the growth of ransomware payouts increasing nearly 200% in