How to mitigate an HTTP request smuggling vulnerability
TAGS: HTTPS | vulnerability management | vulnerability testing Load balancers play a crucial role in modern web architectures. In addition to managing the routing of traffic, they also …Continue reading →
Don’t Be Victimized by a Supply Chain Attack
TAGS: vulnerability testing Six years ago, a major U.S. retailer suffered one of the most famous data breaches in history. Attackers compromised the …Continue reading →
Defense Department Puts Bounty on Bugs
TAGS: bug bounty | vulnerability management | vulnerability testing Cold hard cash is a strong motivator for many people and the Department of Defense is hoping that hackers are …Continue reading →
PCI DSS Compliance Health Check
TAGS: patching | PCI DSS | penetration testing | vulnerability testing How are you doing with PCI DSS compliance? Have you taken a close look at your controls recently to ensure …Continue reading →