Download Netsparker
Pricing
Blog
Contact
Netsparker

Tailoring the Web Security Scan Reports to Match Your Organization's Security Policies

This article explains how you can use the Report Policy Editor in Netsparker Desktop to customize the scanner's scan results and reports so they match your organization's security policies. Read more...

Understanding the Differences Between Technical and Logical Web Application Vulnerabilities

Web application vulnerabilities can be split within two categories; logical and technical vulnerabilities. This post explains the main differences between these two different vulnerability categories. Read more...

URL Rewrite Rules and Web Vulnerability Scanners

Category: Web Security Readings - Tags: web application security , url rewrite rules , web security scans - Tue, 15 Jul 2014, by Robert Abela
URL Rewrite Rules have become extremely popular in web applications but many web vulnerability scanners fall short of automatically scan such websites. Read this article to learn more on why typical web vulnerability scanners are unable to scan websites which use URL rewrite rules and what Netsparker did to allow users to easily and automatically scan websites with URL rewrite technology enabled. Read more...

Why QA Pros Should Be More Involved in Web Security

This security post explains why QA team members can be a good fit to do web application security testing and vulnerability finding and why businesses should involve more QA team members in their web application security programs. Read more...

Don't Waste Your Testing Team's Talents - Automate the Repetitive

Many companies shy away from automated testing: it cannot replace manual testing, they reason, and so why invest so much in it? This view can be defended for user interface testing, but it falls short of the reality of web security testing, or better web vulnerability scanning. Read more and learn how an automated web vulnerability scanner can help you get the best out of your web testing and security teams Read more...

Getting Started with Web Application Security

A complete detailed guide to web application security. This guide includes everything you need to know to get started with web application security and explains which tools to use, how to choose such tools and also explains how to secure completely all the components of a web application environment. Read more...

Working in QA? Take your Web Application Security Testing to the Next Level

As a QA professional, you are in a perfect position to add much more value to the web application security testing and vulnerabilities detection processes. Read more and learn what you can do to improve your testing skills and start incorporating more complete web application security tests in your normal QA tests. Read more...

Is Your Web Vulnerability Scanner Uncovering All Vulnerabilities?

Category: News - Tags: web application security , web security scan , vulnerability detection - Fri, 31 Jan 2014, by Robert Abela
In just 3 years and 1 month Netsparker published 47 advisories to prove that Netsparker Web Application Security Scanner has one of the best web application vulnerability detection rate. Can your automated web vulnerability scanner identify all the vulnerabilities on your web applications and websites or not? Read more...

The Importance of Planning out Web Application Security Testing

Category: Web Security Readings - Tags: web application security , web security automation , web security scan - Thu, 16 Jan 2014, by Robert Abela
This article explains how to plan a web application vulnerability detection program to ensure that all vulnerabilities in your business web applications are identified and closed. It also explains what are the basic building blocks for a successful web security assessment. Read more...

Why You Should Run Authenticated Web Security Scans

Category: Web Security Readings - Tags: web application security , web security scan , authentication - Thu, 31 Oct 2013, by Robert Abela
Do you scan all sections of your web applications, including the authenticated sections? In this blog post you will find a number of reasons why you and every other web security expert and penetration testers should run authenticated web application security scans. Read more...

Follow us