Tag Archives: Vulnerabilities Assessment

MBSA to Keep your Windows System up-to-date

Keeping your system updated is very important to avoid new malwares and to fix vulnerabilities that allow a malicious user have a full control on your system, well I used to enable the automatic update on all Microsoft based systems

4 Reasons why Deploying a Vulnerability Scanner Saves Time

Networks are huge. It is mind blowing how many different elements make up a network. You have at a high level the software and hardware. You get many different flavors of operating systems which might also differ in patch level

COREvidence New Vision for Security Scanners

Any security professional have his own way and tools to conduct vulnerability assessment , the problem that we have when using different security assessment tools that utilities produce several reports with different results. This is not the only problem another

Secunia Releases Patch Management Utility

Secunia Danish computer security service provider announced the final version of the Secunia Corporate Software Inspector 4.0 (CSI 4.0). This tool may identify vulnerabilities for about 13 000 applications from 2300 developers. CSI 4.0 has a free trial version which

TippingPoint and Qualys Together To Mitigate Network Security Risks

TippingPoint and Qualys Network security companies are about to develop and deliver a Network security software, to provide their customers a full package for corporate Network security. Both companies are looking to build a business partnership to enhance their customer

Methods to Avoid Zero day attack

Updating software packages, configuring firewall properly and implementing an antivirus solution can help to guarantee good security for a home user. But when it comes for corporate information system that provides services for public network and have an outside access,

The Cost Of Fixing An Application Vulnerability

The cleanup cost for fixing a bug in a homegrown Web application ranges anywhere from $400 to $4,000 to repair, depending on the vulnerability and the way it’s fixed. Security experts traditionally have been hesitant to calculate the actual cost