Stay up to date with our blog

Subscribe to the InvGate Digest, and receive our monthly newsletter with a packet of knowledge, training, and tools on a new IT topic.

Desirée Jaimovich

The Basics of Vulnerability Management

Vulnerability management is a proactive and continuous process that seeks to keep networks, systems, and general applications as safe as possible from cyberattacks. Vulnerability management ...

14 Most Common Types of Cyber Attacks (and How to Prevent Them)

With the digital transformation in general (and the expansion of the...

Red Team vs. Blue Team: The InfoSec Color Wheel

It is essential to work in teams to strengthen organizations' security....

What Are Red Team Scenarios? Methodology and Examples

Red team scenarios are frameworks companies use to evaluate their level of...

SCP Port: Secure Copy Protocol Definition & Examples

The SCP port has proven to be a very useful tool for SysAdmins. In short,...

7 Patch Management Best Practices

Patch management best practices ensure we do patch deployment effectively...

An Introduction to Patch Management

Patch management is the process of acquiring and applying updates to...

The 5 Phases of Project Management

In IT, project management refers specifically to the planning, scheduling,...

How to Locate a Device Using a MAC Address

Every device on a network has a unique address called IP address, which...

What is Shadow IT and Why Should It Be Avoided?

Shadow IT. Just the name itself sounds spooky, like a ghost is haunting...
logo-pwc
logo-nasa
logo-mapfre
logo-arcos
logo-toyota
logo-globant

Evaluate InvGate as Your ITSM Solution

30-day free trial - No credit card needed