Web Application Security
Verdict: This has long been one of our favorite products and it is well worth considering.
Verdict: Good, well though-out tool and, if you are looking for out-of-the-box compliance capabilities, this one demands your attention.
Verdict: A powerful tool with a clear and important mission that it fulfills well. We make this our Recommended product this month.
Verdict: This is one of the best tools of its type that we’ve seen. It is comprehensive, reliable and easy to use. We make it our Best Buy.
The Rise of Mobile Espionage. What You Need to ...
Smartphone sensors pose new threats to the security of your company. This paper gives an overview of "Mobile Espionage", including who is collecting sensor-driven data and how to protect...
Bug Bounty Programs – Not a Quick Fix
Application security testing is becoming increasingly important to get right. This report highlights why bug bounty programs, while helpful and important, should not be used as a...
Which Platform Is The Best Fit For Your Use Case?
Most organizations have embraced multiple platforms to automate their processes. This paper provides guidelines as you decide whether you should leverage an existing platform for...
SC Media eBook on Incident Response
This eBook looks at the first 9 essential steps you need to take immediately upon finding a breach. Miss one of these steps and you could be looking at long-term problems.