Please turn on your JavaScript for this page to function normally.
Intertrust and Jscrambler launch joint solution to protect mobile and JavaScript applications

Intertrust Technologies and Jscrambler announced a jointly-sourced product suite App Shield 360 that provides a set of application shielding solutions for both native and …

Qualys and IBM X-Force Red help orgs identify, fix most critical vulnerabilities

Qualys announced that IBM X-Force Red will leverage the Qualys Cloud Platform as part of its X-Force Red Vulnerability Management Services (VMS). As part of an expanded …

DevSecOps
Only 8% of orgs have effective DevSecOps practices

92 percent of organizations struggle to implement security into the entire DevOps process despite most saying they want to do so – a staggering capability gap exposed in …

IBM Security now opens network of four secure testing facilities globally

IBM Security announced X-Force Red Labs, a network of four secure facilities dedicated to testing the security of devices and systems including consumer and industrial IoT …

Optiv Security enables organizations to evaluate their digital footprints

Optiv Security announced EnemyPerspectives@Optiv, an integrated suite of services that allows an organization to evaluate its digital footprint from the perspective of a …

Spirent extends CyberFlood with Data Breach Assessment for testing of networks and devices

Spirent Communications announced the availability of the solution using data breach emulation technology to provide holistic and hyper-realistic security testing of networks …

Qualys provides visibility of inaccessible IT assets

Qualys announced a new Out-of-Band Configuration Assessment (OCA) module that allows customers to achieve complete visibility of all known IT infrastructure by pushing …

Qualys integrates real-time network analysis in its Cloud Platform

Qualys has introduced Passive Network Sensor (PNS), a new member of the Qualys sensor family that natively integrates network analysis functions into the Qualys Cloud …

robot
Researchers open source tools to identify Twitter bots at scale

Duo Security published technical research and methodology detailing how to identify automated Twitter accounts, known as bots, at a mass scale. Using machine learning …

Qualys
Qualys at Black Hat USA 2018: Hear best practices from industry leaders

There will be no lack of interesting content from Qualys at Black Hat USA 2018 this year. Depending on you interests, you might want to make time for some of these talks and …

Black Hat
Three security trends to watch for at Black Hat USA 2018

Thus far in 2018, organizations and individuals worldwide have experienced a large number of high profile cyber attacks, with criminals stealing billions of dollars as well as …

Don't miss

Cybersecurity news