Our Blog
Home / Blog

2021 State of ITAM
Digital transformation is accelerating in organizations. The traditional roles of information technology asset management (ITAM) and software asset management (SAM) must evolve beyond compliance and audits in order to ensure each service is aligned with strategic IT...

The 3 Pillars of Web Application Security
In web application security, as in other areas of the tech industry, we tend to focus on the tools and all the new and exciting features they bring. Choosing the right tools is crucial, but tools don’t use themselves, so they are only one of the pillars holding up...

Cache Poisoning Denial-of-Service Attack Techniques
Attacks related to cache poisoning represent a clearly visible web security trend that has emerged in recent years. The security community continues to research this area, finding new ways to attack. As part of the recent release of Acunetix, we have added new checks...

Cybersecurity and software asset management – the perfect match
Although cybersecurity has always been important, it arguably has never been more vital for organizations to protect their data and reduce the risk of being hacked with so many of us working from home these days. More employees working from home leaves an organization...

Observations on 2020 From the CIO Hot Seat
Whilst any large-scale event, such as coronavirus, can have a significant impact on many people across the globe, we all experience things differently and will naturally each view the event from individual, and unique perspectives. I therefore find it helpful to...