Edgescan Selected As Best Vulnerability Management Solution

Edgescan Selected As Best Vulnerability Management Solution

The SC Awards Europe 2020 has awarded Edgescan the Best Vulnerability Management Solution for 2020. According to the judges, Edgescan was described as a “Good all-rounder,” and “A highly scalable SaaS solution with good TCO, collaboration across other tools.", concluding that it is a: “valuable product that addresses major external threats and adds human context.”



Edgescan was also highly commended (I think that means we came second) in the Best Enterprise Security Solution category, and described by the judges as: “A great example of a comprehensive vulnerability management system with excellent reporting capabilities.”


Edgescan Product Review


Computing Security UK, have recently published an independent review of Edgescan. According to them: "Edgescan’s full stack vulnerability management allows it to scan at the network and application layers. This full visibility across the entire infrastructure and applications does away with the need for more costly point solutions." You can access or download the entire review on the Computing Security UK website.


API Hacking For The Actually Pretty Inexperienced Hacker


If you’re thinking that hacking APIs requires specialized knowledge think again. A simple online search for "Bug Bounty" will provide a whole range of sites and services to teach you how to get started. I have even heard that a group of retired ladies have started a "Bug Bounty" club to see if they can supplement their pensions! Unfortunately not all API hackers are nice old ladies, and increasingly major data breaches are as a result of APIs that have not been implemented correctly. Gartner are of the opinion that by 2022, “API abuses will be the most-frequent attack vector resulting in data breaches for enterprise web applications.” The following YouTube video gives some idea of how easy it has become for even inexperienced hackers to look for vu ..

Support the originator by clicking the read the rest link below.