Our Blog

Home / Blog

Invisible implants in source code

Invisible implants in source code

Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code. Invisible implants in source code. Enoch RootNovember 23, 2021 University of Cambridge experts described a vulnerability they say affects most modern compilers....

Microsoft Application Taken Down By Expired Certificate

Microsoft Application Taken Down By Expired Certificate

Find yours before they impact your business With the recent news of the worldwide outage for Windows 11 users. it’s a stark reminder to all engineers about how an expired certificate can take entire systems offline. On November 1st, the company issued a warning that...

Assess coverage. Automate package deployment.

Assess coverage. Automate package deployment.

In IT—as in the rest of the business world—time, effort and resources are finite. What can you do to make the most out of all three and keep software up to date? Automate. Assess coverage. Automate package deployment. Wrangling your organization’s substantial software...

The secret to getting results, not noise, from your DAST solution

The secret to getting results, not noise, from your DAST solution

Products for dynamic application security testing (DAST) vary widely in quality and capabilities. A low-quality tool that merely ticks a box will do little to improve security and may generate more work than it saves. But a mature, high-quality solution can bring...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo