Is Your Website Hackable? 70% are. Detect and act with Acunetix:Red Team vs. Blue Team Exercises for Web Security

Is Your Website Hackable? 70% are. Detect and act with Acunetix:Red Team vs. Blue Team Exercises for Web Security

One of the best ways to verify the security posture of a business is to perform a mock attack. This principle is behind the concept of penetration testing (manual mock attack) and vulnerability scanning (automatic mock attack). While penetration tests and...
Microsoft’s License Changes for Public Cloud: How Do They Affect You?

Microsoft’s License Changes for Public Cloud: How Do They Affect You?

On August 1, 2019, Microsoft announced major changes to the rules for bringing Microsoft licenses to the public cloud, including AWS, Alibaba and Google. “Beginning October 1, 2019, on-premises licenses purchased without Software Assurance and mobility...
Penetration Testing vs Vulnerability Scanning

Penetration Testing vs Vulnerability Scanning

Businesses often perceive vulnerability scanning as an alternative to penetration testing. This perception is wrong. An organization conscious about cybersecurity must include both these activities in their business processes and make sure that they work in...
How to Prevent Blind SQL Injections: The Basics

How to Prevent Blind SQL Injections: The Basics

Blind SQL Injections are a subtype of SQL Injection vulnerabilities. Exploiting Blind SQL Injections is more difficult and more time consuming for the attacker but the consequences to web application security are similar. Successful exploitation of the...