scanning
An in-depth view of IT policy compliance
Qualys announced the release of QualysGuard Policy Compliance 3.0, providing more comprehensive policy compliance scanning capabilities without the need to install agents. The …
Web application scanning on a new level
Qualys announced the release of QualysGuard WAS 2.0 with several major enhancements to help customers catalog their web applications on a global scale and scan them for …
Nmap 5.50 released
Nmap is a free and open source utility for network exploration or security auditing. A primary focus of the 5.50 release is the Nmap Scripting Engine, which has allowed Nmap …
SAINT Professional for Mac OS X released
SAINT Professional 7.6 introduces a native Mac OS X installer providing the industry’s first integrated security assessment tool for the Apple community with …
Nessus in the cloud
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of an …
CORE IMPACT Pro 11 now detects and exploits network router vulnerabilities
Core Security Technologies introduced the latest version of its automated penetration testing solution, CORE IMPACT Pro 11. CORE IMPACT Pro enables users to conduct real-world …
Vulnerability scanning added to GFI MAX RemoteManagement
GFI Software added vulnerability scanning and security patch management to GFI MAX RemoteManagement, an IT managed services software solution that makes it easy to stay on top …
IBM improves software security analysis
IBM announced new software and analysis capabilities that provide a more efficient and accurate way to design and manage secure applications. By consolidating software …
Nessus vulnerability scanner 4.4.0 released
The Nessus vulnerability scanner features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security …
Go Daddy offers vulnerability site scanning tool
A lot of the news concerning Internet domain registrar and Web hosting company Go Daddy that we covered lately had to do with compromised sites hosted on its servers. And …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)