Corporations today face increased levels of risk from software vulnerabilities hidden in their business-technology systems and from hackers and cyber crooks who try to steal proprietary corporate ...
What are the common indications that an organization's vulnerability management program is not functioning properly? Gary McCully of SecureState presents methods and suggestions for rooting them out ...
SEATTLE, JULY 9, 2012 – F5 Networks, Inc. (NASDAQ: FFIV), the global leader in Application Delivery Networking, today announced a new program that offers enterprise organizations free application ...
Every couple of weeks, a project comes across my desk that requires some sort of Web application vulnerability assessment or penetration test. It's one of the more fun things I get to do, and I rely ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. F5 Networks is partnering with Cenzic and WhiteHat ...
The most basic step in dealing with attacks is finding a combination of assessment tools that can identify vulnerabilities and reduce exposure Last December, over 100,000 WordPress websites were ...
As organizations harden their networks, Web applications have become primary targets for cyber-attack, according to a new report. "Hackers have realized that because networks are secure, the ...
Achieving Sarbanes-Oxley (SOX) compliance is not impossible, but there are a few key elements beyond ethical leadership that are necessary to achieve and maintain it. Public corporations must ...
The Atlanta-based maker of WebInspect Web application vulnerability assessment software also announced interoperability with the NC-1000 Web security gateway appliance from NetContinuum, a supplier of ...
Seventeen million programmers are churning out an estimated 102 billion new lines of code per year. Add 162 million websites online, with 809,000 using SSL (an indication of valuable data) and the ...