WhiteHat is positioned extremely well to capitalize on recent developments in ML. ML allows us to make sense of the data, train a set of expert networks on this data, and then use these networks to supplement our human element.
We’re pleased to announce a refresh of our Vulnerability Management overview tab.
Application Security is, in many ways, something your banks, your hospitals, your games, and all your online eCommerce and transaction people try to take care of for you. But no one is perfect. No company has all the right answers.
Fortinet’s FortiWeb product imports the results from Sentinel’s dynamic scanning and creates virtual patching options for the administrator, so they can decide where to block or allow traffic based on timely information of the current vulnerabilities in their web services.
Recent high-profile attacks on healthcare organizations have highlighted the need for data security that goes far beyond simply being compliant.
WhiteHat Sentinel Source, which provides requisite plug-ins and integrations to these developer tools, including the Jenkins CI build tool for support of automated project builds as well as Sentinel scans of source code.
The conversation was interesting in that his program is quite mature, adequately staffed and funded, and is delivering the results and program benefits planned a few short years earlier. Still, he was having some nagging doubts about its efficacy going forward.
Ransomware has proved itself to be a lucrative attack against organizations in many industries. Attacks against Healthcare in particular have more than doubled in recent years, as both information theft and targeted attacks for monetary gain.
When choosing a vendor to support your application security objectives, there are a number of important factors to consider. In this post, we discuss six critical factors to keep in mind when selecting an application security solution.
WhiteHat Security announces the release of the eleventh annual Web Applications Security Statistics Report. This report takes a look at stats by industry, application security vulnerabilities, remediation and time-to fix by vulnerability class and risk rating.