PWC Global State of Information Security Survey 2016

Price Waterhouse Coopers have just published a report about cybersecurity. Not about the attacks and threats themselves, but about how businesses are tackling the risks. Titled the Global State of Information Security Survey 2016, its key findings relate to measures such as external collaboration and cybersecurity insurance. In summarising some of the main security strategies […]

Read More →

Defence in depth and how it applies to web applications – Part 1

Information security generally refers to defending information from unauthorized access, use, disclosure, disruption, modification or deletion from threats. Organizations are constantly facing threats that exist both externally as well as internally — be they from nation states, political activists, corporate competitors or even disgruntled employees. Defending an organization from these threats is hard because it […]

Read More →

Visit Acunetix at Security Leaders in Sao Paulo

Sunlit Technologies the Acunetix distributor for Brazil, will be exhibiting at the 6th edition of Security Leaders in Sao Paulo on 18th and 19th November 2015, at Fecomércio / SP – Rua Doutor Plinio Barreto, 285 – Sao Paulo. About Security Leaders in Sao Paulo Since 2010, Security Leaders and the Brazilian IT market have been following a broad discussion […]

Read More →

SQLi part 6: Out-of-band SQLi

Out-of-band SQL injection is not very common, mostly because it depends on features being enabled on the database server being used by the web application. Out-of-band SQL injection occurs when an attacker is unable to use the same channel to launch the attack and gather results. Out-of-band techniques, offer an attacker an alternative to inferential […]

Read More →

Gitex Technology Week 2015 highlights

Comguard, the Acunetix distributor based in Dubai, recently participated in GITEX 2015 between the 18th and 22nd October 2015. Acunetix was showcased as one of the key vendors for Comguard at one of the largest and most important ICT on the planet. Now in its 35th year, the 2015 event was attended by over 130,000 […]

Read More →

SQLi part 5: Inferential SQLi (Blind SQLi)

Inferential SQL injection, unlike in-band SQLi, may take longer for an attacker to exploit, however, it is just as dangerous as any other form of SQL injection. In an inferential SQLi attack, no data is actually transferred via the web application and the attacker would not be able to see the result of an attack […]

Read More →

The Draft UK Investigatory Powers Bill

This week a draft ‘Investigatory Powers Bill’ was released by Home Secretary Theresa May and is receiving a great deal of media intention, instead being dubbed the UK ‘Surveillance Bill’. What’s it for? The bill is introduced as being for consolidation of all the laws governing communications data, in order to make it more straightforward […]

Read More →