Corporations today face increased levels of risk from software vulnerabilities hidden in their business-technology systems and from hackers and cyber crooks who try to steal proprietary corporate ...
SecureWorld Expo – Atlanta, GA –May 30, 2013 –Cenzic, the leading provider of application security intelligence to reduce security risks, today announced that it has expanded itsCenzic Managed ...
Karen Schwartz is a freelance technology writer based in the Washington D.C. area. The Census Bureau has moved many of its applications to the web. And like most agencies, Census experiences the ...
Crowdsourced pen tests aren't for everyone, but for one SaaS provider they help identify software flaws that automated tools may miss. You could say Kris Lahiri, VP operations and chief security ...
SANTA CLARA, CA--(Marketwire - November 9, 2009) - Cenzic Inc., the leading provider of Web application security vulnerability assessment and risk management solutions, today released its report ...
eSpeaks' Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
While traditional penetration testing (pen testing) has long been the go-to method for identifying security gaps in a organization’s network and web application, a new approach has emerged: ...
Hewlett-Packard may not be the first name that comes to mind when the conversation turns to application security, but since its acquisition of SPI Dynamics last year, HP has increased its investment ...
Achieving Sarbanes-Oxley (SOX) compliance is not impossible, but there are a few key elements beyond ethical leadership that are necessary to achieve and maintain it. Public corporations must ...
SPI Dynamics, a provider of Web application security assessment software and services, is being acquired by HP. Terms of the deal were not disclosed. SPI is privately held. The deal will help HP ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results