ImmuniWeb Security Blog | Page 25
Learn the best practices for developing a security awareness training program that is engaging. Engaging awareness programs have been shown to change more users’ behavior and ...
If you speak with management about money – speak their language and you will definitely get what you need.
Vulnerable web application is just one of the great gifts left for hackers, as it significantly reduces their time, cost and efforts to get into corporate network. Why companies ...
Have you ever though how secure and reliable is your SSL/TLS connection to your email servers? A brief research about encryption implementation of the most popular free email ...
Being a large company, you have a risk when hiring a third-party consultant - you condemn them to be hacked instead of you.
How efficiently do the Global 2000 companies protect our data between their web servers and our computers or mobiles?
Growing DDoS attacks more and more frequently try to distract incident response teams in order to hide much bigger security incidents.
How to secure connected devices before it will be too late?
In June 2015 The Forum of Incident Response and Security Teams (FIRST) has announced the availability of version 3 of the Common Vulnerability Scoring System (CVSS). Let's see the ...
One of the recent web application security researches by Gartner mentioned a blind XSS vulnerability, highlighting the importance of web security software to detect such security ...
Nowadays security companies have to compete not only with other vendors, but also with sophisticated cyber gangs. If you will fail to detect and patch security vulnerabilities in ...
In this short blog post we will try to understand in quick and simple manner the difference between SAST and DAST testing methodologies, their advantages and disadvantages, as ...