Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Documentation
  • Get a demo
THE ACUNETIX BLOG

Web Security Zone

4 Tips to kickstart your application security effort

Web Security Zone | July 26, 2016 by Ian Muscat

Securing web applications is not an easy task; especially when the application is constantly changing and business-critical. Identifying where to start could be overwhelming, especially if you’re just dipping your toes in application security. Here are four tips to help you get started. 1. Know your…

Read more

Securing MySQL Server on Ubuntu 16.04 LTS – Configuring MySQL Securely, Part 3

Web Security Zone | July 21, 2016 by Agathoklis Prodromou

In part 2 of this series, we looked at configuring MySQL securely. In this final part we shall continue looking at ways in which to ensure a secure MySQL Configuration. Secure Communications In some cases, we might have the MySQL database server setup on a dedicated…

Read more

Securing MySQL Server on Ubuntu 16.04 LTS – Configuring MySQL Securely, Part 2

Web Security Zone | July 19, 2016 by Agathoklis Prodromou

In part 1 of this series, we looked at Installing MySQL Server on Ubuntu 16.04 LTS. In this second part, we will be looking at configuring MySQL securely. LEARN MORE: SQL Injection Scanner LEARN MORE: SQL Injection Attack Configuration We will start off with the most…

Read more

Securing MySQL Server on Ubuntu 16.04 LTS – Installing MySQL, Part 1

Web Security Zone | July 14, 2016 by Agathoklis Prodromou

Databases can be found in everything from desktop applications, web applications, corporate servers to smartphones and other devices. Almost every software program relies on some sort of database to store its data. As applications continue to grow, so is the amount of data that is…

Read more

Recent survey shows cost of a breach has climbed to $158 per record

Web Security Zone | July 4, 2016 by Acunetix

A recently published report titled the ‘2016 Cost of Data Breach Study: Global Analysis’ has suggested that the average cost of a data breach continues to climb, now reaching an average of $4million per breach, or $158 per record from a survey of 383 companies…

Read more

In the headlines: TeamViewer hack, LinkedIn hack, TrainLink breach and more

Web Security Zone | June 9, 2016 by Acunetix

TeamViewer hack – PCs hijacked and bank accounts drained TeamViewer, the remote desktop connection software that allows users to share screens and allow remote access from anywhere in the world recently went offline allegedly due to a DOS-attack. Users however, claim that their computers were…

Read more

Value of cyber security market set to soar to $6.7billion

Web Security Zone | May 30, 2016 by Acunetix

It comes as no surprise that the value of the application security market has risen dramatically in the last few years. Simple deduction tells us bigger cyber-attacks = more money spent on cyber defense. However, the latest claim by market analysts is that by 2021,…

Read more

Scanning non-public web applications with Acunetix Online

Web Security Zone | May 25, 2016 by Ian Muscat

The Software Development Life Cycle (SDLC) is full of challenges — developers have strict deadlines for creating functional, scalable, maintainable and testable code. What’s more, that code needs to be secure. Acunetix Online among other features, acts as an IP vulnerability scanner and can automatically…

Read more

Verizon Data Breach Investigations Report 2016

Web Security Zone | May 19, 2016 by Acunetix

So, it’s that time of year again. The Verizon Data Breach Investigations Report is out and its time for us to take a good look and analyze their results. The cover, which is dark featuring an illuminati-style symbol and the pull out statistic of ‘89%…

Read more

  • 1
  • …
  • 33
  • 34
  • 35
  • 36
  • 37
  • …
  • 74
  • 35 / 74
Subscribe by Email

Get the latest content on web security in your inbox each week.

We respect your privacy

Learn More
  • IIS Security
  • Apache Troubleshooting
  • Security Scanner
  • DAST vs SAST
  • Threats, Vulnerabilities, & Risks
  • Vulnerability Assessment vs Pen Testing
  • Server Security
  • Google Hacking
Blog Categories
  • Articles
  • Web Security Zone
  • News
  • Events
  • Product Releases
  • Product Articles

Take action and discover your vulnerabilities

Get a demo
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Documentation
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2025, by Invicti