As organizations harden their networks, Web applications have become primary targets for cyber-attack, according to a new report. "Hackers have realized that because networks are secure, the ...
SEATTLE, JULY 9, 2012 – F5 Networks, Inc. (NASDAQ: FFIV), the global leader in Application Delivery Networking, today announced a new program that offers enterprise organizations free application ...
What are the common indications that an organization's vulnerability management program is not functioning properly? Gary McCully of SecureState presents methods and suggestions for rooting them out ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. F5 Networks is partnering with Cenzic and WhiteHat ...
Every couple of weeks, a project comes across my desk that requires some sort of Web application vulnerability assessment or penetration test. It's one of the more fun things I get to do, and I rely ...
Corporations today face increased levels of risk from software vulnerabilities hidden in their business-technology systems and from hackers and cyber crooks who try to steal proprietary corporate ...
Web services security and compliance with the Payment Card Industry (PCI) Data Security Standards are top-of-mind customer concerns that the latest version of Watchfire's AppScan Web application ...
Startups such as SPI Dynamics offer Web application scanners that allow security integrators and software developers to unearth holes in Web applications that attackers could exploit to obtain ...
The Atlanta-based maker of WebInspect Web application vulnerability assessment software also announced interoperability with the NC-1000 Web security gateway appliance from NetContinuum, a supplier of ...
Achieving Sarbanes-Oxley (SOX) compliance is not impossible, but there are a few key elements beyond ethical leadership that are necessary to achieve and maintain it. Public corporations must ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results