auditing
Doctors used silicone fingers to fool fingerprint scanner
Fingerprint scanners might not work with severed fingers, but artificial ones still manage to fool them, as proved by the recent discovery of a fraudulent scheme set up by …
Auditing of Web apps with analytics dashboard for compliance
SaaSID has launched Cloud Application Manager 2.0 (CAM), the latest version of its browser-based authentication, management and auditing solution. CAM 2.0’s audit report …
IT complexity and change auditing
Robert Bobel is the Director of Product Management at NetWrix. In this interview he talks about change auditing trends, enterprise security issues, increasing IT complexity …
Firewall management now concentrated on secure application connectivity
Tufin Technologies announced the results of its annual Firewall Management Survey at RSA Conference 2013 in San Francisco. 200 network security professionals reported that …
Qualys FreeScan service expanded with vulnerability scanning and configuration auditing
At RSA Conference 2013, Qualys has expanded its popular FreeScan service to support scanning internal and external systems and web applications and also added new security and …
IS Decisions releases FileAudit 4
IS Decisions released FileAudit 4, its file audit, archiving and reporting tool. It is the only file auditing solution Microsoft-certified for compliance with Windows 8 and …
Log audit reveals developer outsourced his job to China
Log analysis can reveal a lot of security mistakes and fails, but a lot of security sins, too. Take for example the incident recently shared by Verizon’s Risk Team: …
Improve your firewall auditing
As a penetration tester you have to be an expert in multiple technologies. Typically you are auditing systems installed and maintained by experienced people, often protective …
Top 10 risks found by your auditor
KirkpatrickPrice offers a list of the most common risks they find. 1. No formal policies and procedures Formal guidelines of policies and procedures help provide your …
Security posture management from FireMon
FireMon announced Security Manager 6.0, a security policy and posture management solution that integrates risk analysis with configuration management, enforcement and auditing …
Nmap 6 released
Nmap is a free and open source utility for network exploration or security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the …
World renowned experts to examine SSL governance
Just two months from its inauguration date at the RSA Conference in San Francisco on February 29, the Trustworthy Internet Movement (TIM) announced today that it has chosen …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security