Blog Posts Tagged with "vulnerability scanning"

D36d0936f0c839be7bf2b20d59eaa76d

Augmented Reality Will Compromise the Privacy and Safety of Attack Victims

July 08, 2020 Added by:Steve Durbin

Augmented Reality (AR) technologies will provide new opportunities for attackers to compromise the privacy and safety of their victims.

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

Raising the Bar on Application Security Due Diligence

April 24, 2013 Added by:Rohit Sethi

Many automated scanning solutions are outstanding in their cost effectiveness and ability to find certain classes of vulnerabilities. For example, a properly-configured static analysis solution may help you find every instance of potential SQL injection in your software.

Comments  (0)

7e364bbac217114a59e547b354e7f7ad

Is Your Scanning Vendor Cheating?

April 22, 2013 Added by:Gary McCully

Is Your Scanning Vendor Cheating? Do Vendors Request Whitelisting just to Inflate Numbers?

Comments  (0)