Code analysis and app security testing simplified
Posted on 28 April 2014.
Quotium announced the release of Seeker Enterprise 3.0, whose innovative technology correlates application behavior with simulated hacker's attacks to pinpoint vulnerable code.

Seeker is the run-time code & data analysis application security testing solution for the software development life-cycle (SDLC). It assists in vulnerability management by accurately demonstrating risks to business critical data. It can be fully automated and is very suitable for Agile and continuous integration environments.

Delivering an application security testing automation process in the development lifecycle, it allows organizations to secure every build, every release and every application without requiring manpower overhead or specific security knowledge.

With Enterprise Version 3.0, Seeker delivers new and unique capabilities that allow organizations to handle software cyber threats in fast-paced development environments.

Among the many new features that have been introduced in this version are:
  • Enhanced automation capabilities
  • Better cross-organizational security view and reporting
  • Assessment of cross-organizational compliance status
  • Team security performance metrics and more.
The new dashboards allow executives and managers to view their overall organizational security status, see which systems pose the most threat, which compliance requirements are met and which aren't.

The enhanced automation capabilities allow better integration in cloud environments, with the ability to fully orchestrate Seeker and automatically run security testing in private cloud settings. It performs automatic results triage via exploitation of vulnerabilities, eliminating the need for human effort as part of the process. This makes Seeker suitable for use by non-security personnel, and easy to place in the hands of developers or DevOps.

Quotium will showcase the solution at Infosecurity Europe 2014 this week.


51% of consumers share passwords

Posted on 20 August 2014.  |  The research revealed that consumers are not only sharing passwords but also potentially putting their personal and sensitive information at risk by leaving themselves logged in to applications on their mobile devices, with over half of those using social media applications and email admitting that they leave themselves logged in on their mobile device.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Thu, Aug 21st