auditing
Code analysis and app security testing simplified
Quotium announced the release of Seeker Enterprise 3.0, whose innovative technology correlates application behavior with simulated hacker’s attacks to pinpoint …
Netwrix releases six new auditing solutions
Netwrix released six new Netwrix Auditor solutions, each offered with up to five times more features than before. “As organizations work to implement comprehensive …
Most security managers under pressure to deliver apps faster
At the RSA Conference, Tufin announced the results of a survey of 169 security professionals on the current state of security operations. Conducted at Cisco Live! in Milan, …
Trust but verify: Mozilla execs invite researchers to audit their code
The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into …
Four reasons why audits matter
We live in a world where assurance is a precious commodity. People with bad intentions are getting smarter every day as evidenced by the recent compromise of nearly 40 million …
Netwrix updates its configuration auditing software
Netwrix Corporation announced Netwrix Auditor 5.0, a configuration auditing solution for security, compliance and operations across the entire IT infrastructure. It provides …
Free tool for auditing Google Apps
BeyondTrust released PowerBroker Auditor for Google Apps, available for free, to the BeyondTrust user community. The tool was developed to ease the burdens associated with …
LockPath launches auditing tool
LockPath released Audit Manager as part of the latest version of its Keylight platform, which enhances the end-to-end internal audit process. Controls allow customers to scope …
Nipper Studio: A new approach to security auditing
Developed by UK-based Titania Ltd., Nipper Studio is an interesting solution that takes a whole new approach towards security auditing. Wouldn't it be great to be able to …
You’ve been hacked, now what?
Given the increased frequency and complexity of cyber attacks on business networks of all sizes, the odds of experiencing a breach is almost guaranteed if the right security …
Doctors used silicone fingers to fool fingerprint scanner
Fingerprint scanners might not work with severed fingers, but artificial ones still manage to fool them, as proved by the recent discovery of a fraudulent scheme set up by …
Auditing of Web apps with analytics dashboard for compliance
SaaSID has launched Cloud Application Manager 2.0 (CAM), the latest version of its browser-based authentication, management and auditing solution. CAM 2.0’s audit report …