Roger Johnston talks about how aliens, Elvis impersonators and your worst security users can help you find and fix security problems. Senior Editor Sarah D. Scalet recently spoke with Johnston about ...
API vulnerability scanning and API penetration testing are both important methods for ensuring the security of an API, but they have distinct differences in terms of their scope, methodology and ...
Calvin Hennick is a freelance journalist who specializes in business and technology writing. He is a contributor to the CDW family of technology magazines. Heavy-industry firms — including energy ...
There are almost as many different cybersecurity assessments as there are myths about them. It’s important to know what’s true. Let’s face it: Security assessments aren’t much fun for the team on the ...
Jesper Jurcenoks, CTO of NetVigilance, maker of network vulnerability assessment software, says regular NVA use gives you the most important security information: what’s on your system, and what your ...
Key Takeaways Organizations often think about audits only when a certification deadline approaches or when an auditor sends a long list of document requests. At that point, teams begin searching for ...
Contrast Security, ADR and Runtime Security leader, today announced an integration with ServiceNow Application Vulnerability Response (AVR). The integration gives joint customers better visibility ...