Acunetix v12: More Comprehensive, More Accurate and now 2X Faster

Acunetix v12: More Comprehensive, More Accurate and now 2X Faster

In-depth analysis of JavaScript-rich sites and Single Page Applications London, UK – May 2018 – Acunetix, the pioneer in automated web application security software, has announced the release of version 12. This new version provides support for JavaScript ES7 to...
CCleaner Malware Attack Started With Stolen Credentials

CCleaner Malware Attack Started With Stolen Credentials

The details of a massive data breach impacting Piriform, the company that created the popular system cleanup software CCleaner and was acquired by Avast in July 2017, indicate that the first point of compromise occurred using stolen credentials.  The malware attack...
Automated Endpoint Security: Protect Your Companies’ Weak Points

Automated Endpoint Security: Protect Your Companies’ Weak Points

Halt cyberattacks in realtime with automated endpoint security 70 percent of all malware outbreaks spread through devices that employees use for their work. PCs, laptops, cell phones, and tablets serve as gateways through which hackers access a company. Focusing on...
Making the Shift to IoT Monetization: What’s Top of Mind for Device Manufacturers

Making the Shift to IoT Monetization: What’s Top of Mind for Device Manufacturers

In our recent webinar, Monetize the IoT – From the Edge to the Cloud, Ray Wang examined several emerging IoT business models and explained why they’re successful. We learned that future-proof business models are built using advanced analytical insight to make the...
Sail Smooth with Cloud Threats, Part 2 – Cloud APIs

Sail Smooth with Cloud Threats, Part 2 – Cloud APIs

This is part-2 of a 2 part series that continues to discuss cloud threats and how they affect web applications in the cloud. The following addresses insecure API’s and Management Plane, deepening the threat landscape. Management Plane – Security Perspective The cloud...