Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

Author Archives Tomasz Andrzej Nidecki

THE AUTHOR
Tomasz Andrzej Nidecki
Principal Cybersecurity Writer
LinkedIn
Tomasz Andrzej Nidecki (also known as tonid) is a Primary Cybersecurity Writer at Invicti, focusing on Acunetix. A journalist, translator, and technical writer with 25 years of IT experience, Tomasz has been the Managing Editor of the hakin9 IT Security magazine in its early years and used to run a major technical blog dedicated to email security.

3 reasons why DAST is the best way to begin the web application security journey

Web Security Zone | July 25, 2022 by Tomasz Andrzej Nidecki

To fully secure your web applications, you need several software solutions, specialist internal resources, and external contractors. However, this means significant costs, and not everyone can afford it all at once. How should small businesses start their web application security journey? Let’s have a look…

Read more

How scanners find vulnerabilities

Web Security Zone | July 18, 2022 by Tomasz Andrzej Nidecki

DAST vulnerability scanners are not that different from virus scanners. In both cases, the goal of the software is to find something out of the ordinary in the target. A virus scanner scans a computer’s local resources and storage to find potentially malicious software. A…

Read more

5 reasons why web security is important to avoid ransomware

Web Security Zone | July 11, 2022 by Tomasz Andrzej Nidecki

Ransomware has been a source of major problems for many organizations in recent years. Many of them, aware of this situation, attempt to concentrate their efforts on protecting themselves against this class of threats. This often means that they shift their budgets away from web…

Read more

7 steps to avoid uncoordinated vulnerability disclosure

Web Security Zone | July 4, 2022 by Tomasz Andrzej Nidecki

Imagine the following situation. You work as a cybersecurity manager for a company that owns the website www.example.com. One day, your sales department receives an email from an unknown individual. The sales department forwards it to you. The email has the following content: You example.com/login.php…

Read more

Hackers: The third pillar of security

Web Security Zone | June 27, 2022 by Tomasz Andrzej Nidecki

Every business knows that to maintain security, you need the primary pillar: the right employees. Some businesses know that these employees also need the second pillar: the right tools such as Acunetix and Invicti. However, still, not enough businesses know how to deal with hackers…

Read more

Red teaming – 5 tips on how to do it safely

Web Security Zone | June 20, 2022 by Tomasz Andrzej Nidecki

Red team vs blue team exercises are a very effective method to evaluate the security posture of your business. However, red teaming, due to its adversarial approach, carries certain risks that must be taken into consideration, both for the red team and the target business….

Read more

Threat modeling for web application security

Web Security Zone | June 13, 2022 by Tomasz Andrzej Nidecki

Threat modeling is an activity that helps you identify and mitigate threats. It’s very important because it makes you look at security risks top-down, focus on decision-making and prioritize cybersecurity decisions, and consider how you can use your resources in the best possible way. There…

Read more

Penetration testing vs vulnerability scanning

Web Security Zone | May 30, 2022 by Tomasz Andrzej Nidecki

Businesses often perceive vulnerability scanning as an alternative to penetration testing. This perception is wrong. An organization conscious of cybersecurity must include both these activities in their business processes and make sure that they work in unison. Missing out on one of them greatly decreases…

Read more

What is DevSecOps and how should it work?

Web Security Zone | May 23, 2022 by Tomasz Andrzej Nidecki

DevSecOps stands for development, security, and operations. Similar to DevOps or SecOps, it is a concept that joins two previously separate roles into a unified environment. DevSecOps teams are responsible for providing conditions for continuous secure software development. Being a newer concept than DevOps, DevSecOps…

Read more

  • 1
  • 2
  • 3
  • …
  • 16
  • 1 / 16
Subscribe by Email

Get the latest content on web security in your inbox each week.

We respect your privacy

Learn More
  • IIS Security
  • Apache Troubleshooting
  • Security Scanner
  • DAST vs SAST
  • Threats, Vulnerabilities, & Risks
  • Vulnerability Assessment vs Pen Testing
  • Server Security
  • Google Hacking
Blog Categories
  • Articles
  • Web Security Zone
  • News
  • Events
  • Product Releases
  • Product Articles

Take action and discover your vulnerabilities

Get a demo
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2023, by Invicti