Archive for the ‘vulnerability assessment’ Category

WhiteSource Bolt for GitHub: Free Open Source Vulnerability Management App for Developers

December 5th, 2018
Developers around the world depend on open source components to build their software products. According to industry estimates, open source components account for 60-80% of the code base in modern applications. Collaboration on open source projects throughout the community produces stronger code, squashing the bugs and catching the vulnerabilities that impact the security of organizations who

Posted in GitHub, GitHub Security, Open Source, Penetration testing tools, vulnerability assessment, vulnerability management, vulnerability testing tool | Comments (0)

Why you need to know about Penetration Testing and Compliance Audits?

November 15th, 2018
We live in an age where data flows like water, becoming the new life source of our everyday ventures. As such, you can just imagine what all of that entails and the weight that data receive, especially when it comes to a decision making on how to handle this fairly new and arguably invaluable resource. Of course, we are well aware from a very young age that our water needs to be pure, filtered

Posted in Compliance Audit, Compliance Audits, cyber security policy, cyber security software, cybersecurity, Penetration Testing, Penetration testing tools, vulnerability assessment | Comments (0)

DARPA Challenges Hackers to Create Automated Hacking System — WIN $2 Million

July 14th, 2016

Why we can’t detect all security loopholes and patch them before hackers exploit them?

Because… we know that humans are too slow at finding and fixing security bugs, which is why vulnerabilities like Heartbleed, POODLE and GHOST remained undetected for decades and rendered almost half of the Internet vulnerable to theft by the time patches were rolled out.

Now to solve this hurdle, DARPA

Posted in automated penetration testing, capture the flag, DARPA, def con hacking conference, hacking competition, hacking conference, Penetration testing tools, vulnerability assessment, vulnerability assessment tools | Comments (0)