Slough, UK — 21 April, 2009— Qualys, the leading provider of on demand IT security risk and compliance management solutions, announced today the addition of QualysGuard Web Application Scanning (WAS) ...
Every couple of weeks, a project comes across my desk that requires some sort of Web application vulnerability assessment or penetration test. It's one of the more fun things I get to do, and I rely ...
What are the common indications that an organization's vulnerability management program is not functioning properly? Gary McCully of SecureState presents methods and suggestions for rooting them out ...
Quick Summary Want to safeguard your web and mobile applications from real-world attack vectors? Check out the seven best DAST solutions of 2026 that provide continuous vulnerability detection, ...
The Goolag Scanner was intended as a tool for users to audit their own Web pages through Google. The scanner, a standalone Windows GUI-based application, is grounded in Google scanning technology, a ...
Web applications often handle vast amounts of data, from personal user details to sensitive corporate information. As these applications grow in complexity and importance, they also become primary ...
Researchers at Bishop Fox disclose details on a patched authentication vulnerability in the AirDroid web application that could give attackers remote control over Android devices. AirDroid has patched ...
Ninety-nine percent of applications have one or more vulnerabilities, according to the 2013 Application Vulnerability Trends Report issued by Campbell, Calif.-based application security firm Cenzic.
Vulnerability management tools do more than scan networks. Here's how to use them to detect and mitigate risk across the enterprise infrastructure. Security-smart organizations have gone well beyond ...
Web application vulnerabilities are flaws in the DNA of software that can be exploited by attackers to execute malicious code or commands. Now, due to the widespread nature of apps, solving and ...