Read more about auditing
Bookmark and Share
  • Detect threat patterns across your web and mobile assets

    06.08.2014

    During the Black Hat conference in Las Vegas, RiskIQ announced an automated platform with global reach that enables organizations to discover, scan for malware and gather threat intelligence on all websites and mobile apps that are legitimately or illegally associated with their business.

  • Code analysis and app security testing simplified

    28.04.2014

    Quotium announced the release of Seeker Enterprise 3.0, whose innovative technology correlates application behavior with simulated hacker's attacks to pinpoint vulnerable code.

  • Netwrix releases six new auditing solutions

    13.03.2014

    Netwrix released six new Netwrix Auditor solutions, each offered with up to five times more features than before.

  • Most security managers under pressure to deliver apps faster

    25.02.2014

    At the RSA Conference, Tufin announced the results of a survey of 169 security professionals on the current state of security operations.

  • Trust but verify: Mozilla execs invite researchers to audit their code

    14.01.2014

    The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into their offerings and has prevented them from talking about it publicly, has left many users wondering how they can be sure that the software they plan to use will not be used against them.




Spotlight

Behavioral analysis and information security

Posted on 22 September 2014.  |  In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security and how behavioral analysis can influence the evolution of security technologies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //