Security testing tools News
November 03, 2017
This week, bloggers look into advances in endpoint security systems, achieving greater functionality with AirCheck G2 and the continued role of the command-line interface in an API era.
December 20, 2016
Google offers developers a new tool, Project Wycheproof, to strengthen crypto libraries with a testing suite to check libraries for known weaknesses.
December 06, 2016
Google is making news this week in developer circles. The search giant has come forward with a software fuzzing tool designed to fuzz open source code. What is fuzz (testing)? Fuzz testing or ...
September 08, 2016
If you're going to automate the software testing process, don't hold back. That's in-the-trenches advice from Thomson Reuters' Colin Dorman, and he has practiced what he preaches.
Security testing tools Get Started
Bring yourself up to speed with our introductory content
There are a myriad of free and trial resources available that can help Exchange administrators increase their information security knowledge to better secure systems. Continue Reading
Expert Dave Shackleford examines how malware can now detect virtualization and the range of security tools available for endpoint protection. Continue Reading
The Microsoft Cloud Security Readiness Tool (CSRT) is a survey that assesses the systems, processes and productivity of an IT environment in preparation for the adoption and secure use of cloud computing services. Continue Reading
Evaluate Security testing tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Before purchasing a network security system, consider where your data is located, who has access, where security tools will be deployed and if they're part of a unified strategy. Continue Reading
Today's sophisticated network security technologies work together to provide a tighter net and block malicious behavior both within and at the edge of the network. Continue Reading
Protecting your security perimeter is getting harder, as the threats get more sophisticated and the perimeter harder to identify. But these eight bellwether technologies can help. Continue Reading
Manage Security testing tools
Learn to apply best practices and optimize your operations.
Even with a limited or non-existent budget, Windows Server administrators don't have to skip security testing in their environment. Continue Reading
Here’s how to conquer the steady stream of new technologies and find the best security tools beyond point solutions. Continue Reading
Don't let the deficiencies from applying and managing Exchange threaten your network. Implement third-party security tools to thwart breaches. Continue Reading
Problem Solve Security testing tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A newly discovered injection vulnerability affecting template engines could spell trouble for enterprises. Expert Michael Cobb explains how to stop it. Continue Reading
The early days of mobile computing are gone. Mobile apps continue to grow in number and complexity, and so has industry spend on mobile security, reaching almost $2 billion in 2014. Still, many experts say enterprises are significantly under-spending on mobile security. In this SearchCIO handbook, CIO expert Harvey Koeppel provides tips for how organizations should reformulate their mobile security strategies, including incorporating new mobile security tools such as enterprise mobility management and next-generation encryption, in the midst of this mobile risk-riddled culture.
In our second piece, Senior News Writer Nicole Laskowski discusses how a new application security tool called runtime application self-protection can help enterprises scale their security strategies down to the apps themselves. Lastly, in our third piece, CTO Niel Nickolaisen talks about how the forces of mobile computing have compelled him to seriously consider next-generation security tactics. Continue Reading
Many public cloud providers offer tools to test security, but they can't do it all. Penetration testing can help detect cloud app security gaps. Continue Reading