Ah, the Web. It has generally made business easier and cheaper, but specifically made information security harder and more expensive. Companies in all sorts of industries are rushing to create ...
While traditional penetration testing (pen testing) has long been the go-to method for identifying security gaps in a organization’s network and web application, a new approach has emerged: ...
Corporations today face increased levels of risk from software vulnerabilities hidden in their business-technology systems and from hackers and cyber crooks who try to steal proprietary corporate ...
A survey of almost 600 custom-built Web applications revealed developers are still failing to eliminate the most commonly exploited vulnerabilities from their code, allowing attacks such as SQL ...
There's been a lot of talk in the security industry about the death of the perimeter, as protection technologies on the edge of the network have proven to be insufficient to fully stopping today's ...
SPI Dynamics – These days, the biggest threat to an organization’s network security comes from its public Web site and the Web-based applications found there. Unlike internal-only network services ...
Andrei Neacsu is a cofounder and managing partner at HyperSense. The role of web applications in today's businesses amplifies the repercussions of weak security—leading to potential revenue loss, ...
Historically, IT teams have tended to deploy web application firewalls (WAFs) simply to comply with Payment Card Industry Data Security Standards (PCI DSS). If this is the case in your organization, ...
From vendors offering developer-friendly code security tools to those protecting websites against cyberattacks, here’s a look at 20 key web, email and application security companies. Coolest Web, ...
Almost every week the media picks up on another case of sensitive data being retrieved from Web sites with bad security. Web application security never has been more important, yet many Web sites ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results