Download Netsparker
Pricing
Blog
Contact
Netsparker

Optimize Netsparker Scan Policies for Quicker and More Efficient Web Application Security Scans

Category: Product Docs & FAQS - Tags: web security best practices , netsparker feature , netsparker how to - Mon, 15 Dec 2014, by Robert Abela
This article explains how you can optimize the scan policies in Netsparker Web Application Security Scanner for quicker and more efficient automated web security scans. Read more...

How to Configure URL Rewrite Rules in Netsparker

Category: Product Docs & FAQS - Tags: web security best practices , netsparker feature , netsparker how to - Tue, 15 Jul 2014, by Robert Abela
This article explains how to easily configure URL Rewrite Rules in Netsparker Web Application Security Scanner to scan websites and web applications which have URL Rewrite Technology enabled. By specifying URL Rewrite Rules you can scan the parameters in the URL. Read more...

Netsparker Scan Policies Feature Highlight Video

Category: Product Docs & FAQS - Tags: web security best practices , netsparker feature , netsparker how to - Wed, 04 Jun 2014, by Robert Abela
Scan policies in Netsparker allow you to save a specific Netsparker configuration setup so you do not have to configure the scanner each time you scan a different web application, thus saving a lot of time and improving your productivity. By using Scan Policies you can also specify which type of vulnerability checks should be launched during an automated web vulnerability scan. Read more...

What Can We Learn from Ebay Hack Attack?

Category: Web Security Readings - Tags: web application security , web server security , web security best practices - Thu, 22 May 2014, by Robert Abela
ebay just confirmed that one of its services has been hacked and malicious hackers managed to get their hands on a database that contain sensitive user information such as usernames and passwords. Could such attack have been avoided? This article explains what happened and highlights a number of web security best practices to avoid having your websites and web applications hacked. Read more...

Follow us