Vulnerability Management

Vulnerability Management

Implement a Successful Vulnerability Management (VM) Program in Your Company We are…
Web Application Security

Web Scan Security

Successfully learn how to automatically scan your website for vulnerabilities — on…

IT Policy Compliance

Implement a Successful IT Policy Compliance Program Within Your Company We preparing…
Data Protection

Data Protection

General Data Protection Regulation (GDPR) will be applied in 2018, and is…
Compliance Training

Compliance Training

You can choose your training to your teams according with your needs…
Threat Protection

Threat Protection

Robust data analysis Organizations that fail to properly prioritize vulnerability remediation open…
Alerts Management

Alerts Management

Constant monitoring and alerts When Vulnerability Management (VM) is paired with Continuous…
File Integrity Monitoring

File Integrity Monitoring

Robust real-time change detection engine Cloud solution for detecting and identifying critical…
Open Innovation Security Platform

Open Innovation Security Platform

Organizations have become more collaborative to accelerate innovation in their internal and…


HEADIT CONSULTING is a specialist in Cloud Platform Security, with a Expert Team with more than 18 years develop an IT Secure Platforms. Our services are based on knowledge, intelligence and in innovation to design solutions able to cover and integrate the needs of companies in matter of Security and Compliance. We use the last technology in Artificial Intelligence and Block Chain. HEADIT CONSULTING provides to the Companies the development of a management system for information security. This system is based on a set of policies, procedures, processes and safety rules based on standards and international best practices for Compliance, Data Protection and CiberSecurity. Join Us!

Cyber Reporting Survey

Governance in focus
Cyber risk reporting in the UK
February 2017

Cybersecurity Reporting 2017

Trust, but verify
A new reporting option is now
available to improve stakeholder
communication relative to
cybersecurity risk management

2017 Cyber Threatscape Report

Midyear Cybersecurity Review:
Forecast and Remediations
Executive Summary
Accenture Security

Common Vulnerabilities and Exposures – CVE Database

HEADIT CVE Database is a list of vulnerabilities for security analyst and researchers to identify and address known security issues through vulnerability management solutions.
  • Galaxy S9 und Galaxy S9+: Aktueller Update-Status in Deutschland, Österreich und der Schweiz...
    on Julho 19, 2018 at 7:04 am

    Das Juli-Sicherheitsupdate wird für die freien Modelle von Galaxy S9 und S9+ mit Produktcode DBT ausgeliefert. Es schließt mindestens sechs kritische Sicherheitslücken. startet die Auslieferung der Juli-Sicherheitspatches für […]

  • Vuln: OpenSSL CVE-2017-3736 Information Disclosure Vulnerability
    on Julho 19, 2018 at 7:03 am

    Redhat JBoss EWS 2 Redhat Jboss EAP 6 Redhat JBoss Core Services 1 Redhat Enterprise Linux 7 Oracle VM VirtualBox 5.2.4 Oracle VM VirtualBox 5.2.2 Oracle VM VirtualBox 5.2 Oracle VM VirtualBox 5.1.32 Oracle VM VirtualBox 5.1.20 Oracle VM VirtualBox […]

  • Vuln: libgcrypt CVE-2017-0379 Information Disclosure Vulnerability
    on Julho 19, 2018 at 7:03 am

    Oracle MySQL Workbench 8.0.11 Oracle Communications Interactive Session Recorder 6.0 Oracle Communications Interactive Session Recorder 5.0 GNU libgcrypt 0 Debian Linux 6.0 sparc Debian Linux 6.0 s/390 Debian Linux 6.0 powerpc Debian Linux 6.0 mips […]

  • How hackers exploit critical infrastructure
    on Julho 19, 2018 at 6:53 am

    The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as operational technology (OT) and industrial control system (ICS) infrastructure […]