Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: Application Security

  1. Home
  2. Application Security

CrowdStrike to Acquire Application Intelligence Startup Bionic

crowdstrike-to-acquire-application-intelligence-startup-bionic

The cash-and-stock transaction provides capabilities for CrowdStrike to beef up its enterprise cloud security portfolio.

The post CrowdStrike to Acquire Application Intelligence Startup Bionic appeared first on SecurityWeek.

CISA Releases Open Source Software Security Roadmap

cisa-releases-open-source-software-security-roadmap

CISA details its plan to support the open source software ecosystem and secure the use of open source software within the federal government.

The post CISA Releases Open Source Software Security Roadmap appeared first on SecurityWeek.

Intel Capital Bets on Zenity for Low-Code/No-Code Security

intel-capital-bets-on-zenity-for-low-code/no-code-security

Israeli security startup Zenity banks $16.5 million in new venture capital funding to work on ‘low-code/no-code’ security technology.

The post Intel Capital Bets on Zenity for Low-Code/No-Code Security appeared first on SecurityWeek.

Thousands of Popular Websites Leaking Secrets

thousands-of-popular-websites-leaking-secrets

Truffle Security has discovered thousands of popular websites leaking their secrets, including .git directories and AWS and GitHub keys.

The post Thousands of Popular Websites Leaking Secrets appeared first on SecurityWeek.

GitHub Enterprise Server Gets New Security Capabilities

github-enterprise-server-gets-new-security-capabilities

GitHub Enterprise Server 3.10 released with additional security capabilities, including support for custom deployment rules.

The post GitHub Enterprise Server Gets New Security Capabilities appeared first on SecurityWeek.

Signs of Malware Attack Targeting Rust Developers Found on Crates.io

signs-of-malware-attack-targeting-rust-developers-found-on-crates.io

The Crates.io Rust package registry was targeted in preparation of a malware attack aimed at developers, according to Phylum.

The post Signs of Malware Attack Targeting Rust Developers Found on Crates.io appeared first on SecurityWeek.

Google Brings AI Magic to Fuzz Testing With Eye-Opening Results

google-brings-ai-magic-to-fuzz-testing-with-eye-opening-results

Google sprinkles magic of generative-AI into its open source fuzz testing infrastructure and finds immediate success with code coverage.

The post Google Brings AI Magic to Fuzz Testing With Eye-Opening Results appeared first on SecurityWeek.

Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns

patch-tuesday:-adobe-patches-30-acrobat,-reader-vulns

Adobe rolls out a big batch of security updates to fix at least 30 Acrobat and Reader vulnerabilities affecting Windows and macOS users.

The post Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns appeared first on SecurityWeek.

Apple Lists APIs That Developers Can Only Use for Good Reason

apple-lists-apis-that-developers-can-only-use-for-good-reason

To boost user privacy, Apple is requiring app developers to declare a reason to use specific APIs.

The post Apple Lists APIs That Developers Can Only Use for Good Reason appeared first on SecurityWeek.

The Good, the Bad and the Ugly of Generative AI

the-good,-the-bad-and-the-ugly-of-generative-ai

Thinking through the good, the bad, and the ugly now is a process that affords us “the negative focus to survive, but a positive one to thrive.”

The post The Good, the Bad and the Ugly of Generative AI appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • ...
  • 43
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it