Penetration Testing vs Vulnerability Scanning

Penetration Testing vs Vulnerability Scanning

Businesses often perceive vulnerability scanning as an alternative to penetration testing. This perception is wrong. An organization conscious about cybersecurity must include both these activities in their business processes and make sure that they work in...
How to Prevent Blind SQL Injections: The Basics

How to Prevent Blind SQL Injections: The Basics

Blind SQL Injections are a subtype of SQL Injection vulnerabilities. Exploiting Blind SQL Injections is more difficult and more time consuming for the attacker but the consequences to web application security are similar. Successful exploitation of the...
Not All Open Source Scanning Tools are the Same

Not All Open Source Scanning Tools are the Same

A few months ago  Flexera presented The State of Open Source Software: OSS Trends to Watch in 2019. We talked about important projects supporting OSS governance; the growing acceptance of open source use at an enterprise level, based on fairly...