AppCheck Security Blog

FEATURED POST

What is a trust boundary and how can I apply the principle to improve security?

Appcheck - icons
Cisco ASA 5500 Series Adaptive Security Appliances, ASA) is Cisco’s line of network security devices introduced in May 2005. Cisco ASA has become one of the most widely used firewall/VPN solutions for small to medium businesses. Cisco Secure Firewall Threat Defense (FTD) Virtual brings Cisco’s next-generation firewall functionalities to virtualized environments, enabling consistent security policies to follow workloads across your physical, virtual, and cloud environments, and between clouds.
Appcheck - icons
Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It runs exclusively on Windows Server operating systems. Exchange Server primarily uses a proprietary protocol called MAPI to talk to email clients, but subsequently added support for POP3, IMAP, and EAS. The standard SMTP protocol is used to communicate to other Internet mail servers.
Appcheck - icons
Drupal is a free and open-source web content management system (CMS) written in PHP. Drupal provides an open-source back-end framework for blogs, but also for knowledge management and for business collaboration systems. The standard release of Drupal, known as Drupal core, contains basic features common to content-management systems, including user account registration and maintenance, menu management, RSS feeds, taxonomy, page layout customization, and system administration.
Appcheck - icons
Google Chrome is a web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS, iOS, and also for Android, where it is the default browser. The browser is also the main component of ChromeOS, where it serves as the platform for web applications.
Appcheck - icons
In this blog post we don’t provide a list of “quick tips” for how to improve a vulnerability management programme, since these will vary from one organisation to another, based on how vulnerability management is currently performed. Instead, we lay out how to go about assessing your current programme, and where to look for guidance on how to take it to the next level based on what you find.
Appcheck - icons
Prioritising application security has become a significant focus for modern businesses, and staying informed about the evolving security landscape is crucial for organisations looking to effectively enhance their application security.

Get in touch

Start your free trial

Your details
IP Addresses
URLs