An analysis of web applications shows that 94% of applications tested had at least one high-severity vulnerability. According to Positive Technologies’ Web Application Vulnerabilities in 2017 report, ...
As organizations harden their networks, Web applications have become primary targets for cyber-attack, according to a new report. "Hackers have realized that because networks are secure, the ...
Chances are your security team has devoted a lot of thought, effort and money to security issues in the past year or two. You’ve plugged holes in the operating systems. You’ve done virus and spyware ...
Every couple of weeks, a project comes across my desk that requires some sort of Web application vulnerability assessment or penetration test. It's one of the more fun things I get to do, and I rely ...
It’s been said that Web vulnerabilities are "the new buffer overflow" plaguing the information security community. Almost every day, Bugtraq and other sites record new flaws in commercial or open ...
The Atlanta-based maker of WebInspect Web application vulnerability assessment software also announced interoperability with the NC-1000 Web security gateway appliance from NetContinuum, a supplier of ...
Web applications often handle vast amounts of data, from personal user details to sensitive corporate information. As these applications grow in complexity and importance, they also become primary ...
Achieving Sarbanes-Oxley (SOX) compliance is not impossible, but there are a few key elements beyond ethical leadership that are necessary to achieve and maintain it. Public corporations must ...
The National Security Agency (NSA) has partnered with U.S. and international cyber agencies to release the Cybersecurity Advisory (CSA), “Preventing Web Application Access Control Abuse,” warning that ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna and two ...