Read more about penetration testing
Bookmark and Share
  • Training: The Art of Exploiting Injection Flaws

    03.09.2013

    HITBSecConf 2013 Malaysia will host the widely acclaimed course The Art of exploiting Injection Flaws in Kuala Lumpur on 14 and 15 October 2013.

  • Most security managers don't trust their apps

    02.09.2013

    Application vulnerabilities are a major factor in the cybercrime game.

  • The current state of application security

    28.08.2013

    New research offers a better way to understand the maturity of an organization’s application security program in comparison to the core competencies of high-performing organizations.

  • Working as an ethical hacker

    05.08.2013

    The term "ethical hacker" as it is used today is, if you ask me, somewhat imprecise.

  • Cybercriminals are doing a better job than the companies they target

    05.08.2013

    What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney’s Office in NJ unsealed their indictment against a mostly Russian—one American co-conspirator was also named—gang of cybercriminals who are alleged to have snatched over 160 million credit card numbers resulting in more than $300 million in losses over seven years.




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //