Web applications are exposed. Unlike internal network applications, everyone can get to a web application; all they need is an internet connection. That includes hackers
This article was originally published on HelpNetSecurity on April 16, 2020. Finding security holes in information systems is as old as the first commercially available computer. Back when
This article was originally published on Enterprise Management 360 on March 31, 2020. Penetration testing is the Marmite of cybersecurity: you either love it or you hate
Across the world, companies like Google, Microsoft, Amazon, Twitter, and yes, Beyond Security, have asked their employees to work from home in response to the Coronavirus (Covid-19) pandemic.
On one level, cybersecurity is all about electronics – securing machines, networks and so forth. But, even the most technologically advanced cyber attacks are driven
Cybersecurity threats are growing in size and prevalence – and the nature of cybersecurity is continuously shifting. In particular, operational technology (OT) such as industrial
This past year was a big year for data breaches, new privacy laws and cracking down on existing regulations. British Airways faces a £183m fine after hackers
Testing for behavior vs version The primary requirement for a Vulnerability Assessment solution is accurate testing. Ease of use and clear reports are important, but