Companies have increased the cadence of application-security testing — with triple the number of applications scanned and 20 times more scans per application — compared to a decade ago, according to ...
In this episode of eSpeaks, Jennifer Margles, Director of Product Management at BMC Software, discusses the transition from traditional job scheduling to the era of the autonomous enterprise. eSpeaks’ ...
Most Web application scanning tools miss vulnerabilities and generate false positives on their own public testing sites, according to a recent test of some of these products. Larry Suto, an ...
Today’s Open Source Friday Focus is on Google’s Skipfish web application vulnerability scanner. Google recently released Skipfish to combat one of the biggest problems in information security today, ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna and two ...
In today's security landscape, some of the most dangerous vulnerabilities aren't flagged by automated scanners at all. These ...
Vulnerability Scanning vs Penetration Testing: What’s the Difference? Your email has been sent Many IT security terms have proved challenging to understand due to their similarities and contextual ...
Conventional wisdom says that looking for trouble isnt a good idea. When it comes to IT security, however, finding system troubles before anyone else does is the name of the game. In this special ...
Vulnerability management tools do more than scan networks. Here's how to use them to detect and mitigate risk across the enterprise infrastructure. Security-smart organizations have gone well beyond ...
What are the common indications that an organization's vulnerability management program is not functioning properly? Gary McCully of SecureState presents methods and suggestions for rooting them out ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results