Cybersecurity errors at Nakatomi

Cybersecurity errors at Nakatomi

Many families spend the holidays watching favorite movies together, in lots of cases the same ones year after year, making Christmas and New Year’s traditions. Some people love Christmas comedies, others favor melodramas. As for me, my favorite Christmas movie...
5 Key Challenges for IT Automation

5 Key Challenges for IT Automation

Automation offers huge potential for streamlining processes and increasing productivity, but it can be difficult to implement. However, if you understand the challenges involved in introducing an automation solution and prepare for them adequately, your organization...
How ITAM can close the door on asset vulnerabilities

How ITAM can close the door on asset vulnerabilities

Software either is or will be vulnerable. It’s rare that you won’t have to update out-of-date, unsupported or end-of-life software. If your job description involves software or IT asset management (SAM/ITAM), this is part of your day-to-day and nothing particularly...
How to Build a Mature Application Security Program

How to Build a Mature Application Security Program

Baking application security into the software development process is a major challenge that requires not only the right tools but also a mature development culture. This article shows the stages of building a mature AppSec program, as discussed by Netsparker founder...
Acunetix Stance on the SolarWinds Hack

Acunetix Stance on the SolarWinds Hack

We at Acunetix and Invicti are deeply concerned with the aftermath of the SolarWinds hack and offer our deepest commiserations to all the security personnel who are facing this situation just before Christmas, and to SolarWinds themselves who have been an unwilling...