Save Time and Money by Enabling IT Staff to Update Software Better and Faster

Save Time and Money by Enabling IT Staff to Update Software Better and Faster

You need new and updated software deployed throughout your organization constantly. Security updates, replacement of the software that has reached the end of life, new releases, application migration efforts attached to a Windows Migration—the list of reasons goes...
What Are JSON Injections

What Are JSON Injections

The term JSON injection may be used to describe two primary types of security issues: Server-side JSON injection happens when data from an untrusted source is not sanitized by the server and written directly to a JSON stream.Client-side JSON injection happens when...
4 Ways to Combat the Cybersecurity Skills Gap

4 Ways to Combat the Cybersecurity Skills Gap

The lack of cybersecurity talent is nothing new. It’s a problem that all businesses have been facing for several years and it’s getting worse. There have been many proposals on how to narrow the gap, but so far all efforts have been futile. Let’s have a look at what...
Step-By-Step Configuration with Jira

Step-By-Step Configuration with Jira

Jira is a popular issue tracker platform. Vulnerability management teams may use it to manage tasks together with other departments. You can easily integrate Acunetix with Jira (both the on-premise and online Jira versions).Note: Before you proceed any further, ensure...
Monthly Vulnerability Review – November 2019

Monthly Vulnerability Review – November 2019

Summary In November, Secunia Research issued 391 advisories from 70 unique vendors in 236 products and 311 unique versions. This is a decrease of 12.8% from last month. Google Chrome issued a zero-day advisory which was dubbed as Halloween Night scare. Also, there...