Remove 5-ways-to-protect-scanning-credentials-for-windows-hosts
article thumbnail

5 Ways to Protect Scanning Credentials for Linux, macOS and Unix Hosts

Tenable

This is the third installment in our three-part series exploring how to use Tenable products to protect credentials used for network assessments. In part 1 of our three-part series, I covered general best practices for protecting credentials when performing network assessments. Securely configure SSH.

Linux 100
article thumbnail

How to make your web application more secure by using Dynamic Application Security Testing (DAST) – PART 2 of Application Security Testing series

Xebia

Like I mentioned in the previous blog, during this blog series we are going to look at the different types of Application Security Testing and Software Composition Analysis. The vulnerable web application is the same one we used in the first blog of this series. It will register these and then start the scanning process.