Security audit News
January 18, 2018
Lenovo's discovery of an authentication bypass, literally titled "HP backdoor," within its networking switches brings unsettling implications for the IT industry.
July 10, 2017
Google to distrust all WoSign CA certificates in Chrome starting in September, as the troubled certificate authority passed a key audit and is seeking a new CEO to help return trust.
May 02, 2017
Mozilla reviews the counterproposal from Symantec and urges the CA giant to opt for Google's recommendation to outsource its certificate activities.
February 03, 2017
A leaked version of a draft of a government cybersecurity executive order from President Trump has experts debating the effects such an order would have.
Security audit Get Started
Bring yourself up to speed with our introductory content
Administrators who wrestle with compliance tasks in Office 365 and Azure workloads might find some relief with Microsoft's dashboard platform, which automates part of the process. Continue Reading
Mobile app reputation is an assessment of the security and privacy of an app, typically expressed as a numerical rating. Continue Reading
Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and compliance regulations. Continue Reading
Evaluate Security audit Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
If unsafe computer systems scare the living daylights out of you, tune into this webinar on how to do authenticated vulnerability scans to avoid system damage. Continue Reading
The right set of IT compliance tools helps IT operations admins keep pace with rapidly evolving -- and increasing -- security regulations. Continue Reading
UDP port scanning isn't as robust as TCP port scanning, but there are steps you can take to include the technique as a security scanning tool. Continue Reading
Manage Security audit
Learn to apply best practices and optimize your operations.
Web application security is crucial, but enterprises also need to look below that layer for web server vulnerabilities. Kevin Beaver explains how to look for common weaknesses. Continue Reading
Security audits vs. security assessments solve different needs. Organizations may use security audits to check their security stature while security assessments might be the better tool to use. Expert Ernie Hayden explains the differences. Continue Reading
Attackers work day and night thinking up new ways to bypass IT security. Educate users on ways to avoid email phishing attacks so you can rest easy. Continue Reading
Problem Solve Security audit Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Real-time behavioral threat analytics is the next frontier in security. Learn how a behavioral threat assessment tool can protect your enterprise systems and data. Continue Reading
Information security assessments can be effective for identifying and fixing issues in your enterprise's policies. Expert Kevin Beaver explains the key components of the process. Continue Reading
It's critical to apply security testing into your app, as cybersecurity affects everyone. Testing before production can help prevent attacks. Expert Gerie Owen explains further. Continue Reading