Flexera an IBM-certified alternative for ILMT

Flexera an IBM-certified alternative for ILMT

Let’s face it, no matter the vendors involved, IT asset management (ITAM) is complex, expensive and time-intensive for enterprises. Flexera’s 2022 State of ITAM found that 83% of software asset management (SAM) teams’ time is spent toward audit activities, and the top...
DAST is the future of AppSec – here are 5 reasons why

DAST is the future of AppSec – here are 5 reasons why

Outside-in or dynamic application security testing (DAST) has become a must-have for today’s sprawling, ever-changing, multi-tech web environments. But automated DAST can be so much more than a tool – and here are five solid reasons why it could be the future of...
Cybercrime: The Dangerous World of QR Codes

Cybercrime: The Dangerous World of QR Codes

QR codes are everywhere these days. People use them to open websites, download apps, collect loyalty points, make payments and transfer money. This is very convenient for people, but of course there is a catch: Cybercriminals also try to cash in and have already...
An Analysis of Dangerous Curves

An Analysis of Dangerous Curves

Some recently exposed vulnerabilities in cryptographic software highlight an old problem. Software often fails when in “exotic and rarely used configurations.” The recently-published CVE-2022-0778 vulnerability, and the related CVE-2020-0601 vulnerability, both...