Organizations have made strides in recent years to lock down networks' perimeters. But even agencies with the tightest network defenses may find another technology layer open to attack: applications.
SEATTLE, JULY 9, 2012 – F5 Networks, Inc. (NASDAQ: FFIV), the global leader in Application Delivery Networking, today announced a new program that offers enterprise organizations free application ...
Corporations today face increased levels of risk from software vulnerabilities hidden in their business-technology systems and from hackers and cyber crooks who try to steal proprietary corporate ...
As organizations harden their networks, Web applications have become primary targets for cyber-attack, according to a new report. "Hackers have realized that because networks are secure, the ...
Web services security and compliance with the Payment Card Industry (PCI) Data Security Standards are top-of-mind customer concerns that the latest version of Watchfire's AppScan Web application ...
It’s been said that Web vulnerabilities are "the new buffer overflow" plaguing the information security community. Almost every day, Bugtraq and other sites record new flaws in commercial or open ...
What are the common indications that an organization's vulnerability management program is not functioning properly? Gary McCully of SecureState presents methods and suggestions for rooting them out ...
Achieving Sarbanes-Oxley (SOX) compliance is not impossible, but there are a few key elements beyond ethical leadership that are necessary to achieve and maintain it. Public corporations must ...
Startups such as SPI Dynamics offer Web application scanners that allow security integrators and software developers to unearth holes in Web applications that attackers could exploit to obtain ...
The Atlanta-based maker of WebInspect Web application vulnerability assessment software also announced interoperability with the NC-1000 Web security gateway appliance from NetContinuum, a supplier of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results