Global Themes and Featured Topics

We are living in the rapid changing world. Where the world change at the speed of light, but existing solutions and product may not even had the right word and definition to sum them what yet. So, we grouping those global themes and trending topic in this section.



For incident to series of event that share the common theme across the globe.



Latest technology breakthrough that set the coming standards.



Changing in the industries practice that shaping the future world.



Special develop content based on changing practice.

How to Secure Enterprise Container Stack?
The main reason why the overtaking of the container is challenging is that container containers involve many moving parts that are constantly changing. What do I mean by that? I think, firstly, the fact that there are plenty of container platforms out there. The variety of used platforms makes it difficult to build a safety device
Tagged under:

Types of IT Policy Compliance

There are various type of IT policy compliance can be introduced. IT Policies or ICT policies can be broken down into categories of policies, for example: IT Governance, Risk and Compliance (IT GRC) policies, like a compliance policy. Project and Change Management policies. IT Goods or Services Acquisition policies. Availability management policies, like disaster recovery (DR), business continuity (BC).
Tagged under:
E-SPIN please to announce for the following latest round of the technology update and upgrade for the following related product lines compiled from the various technical resources for easy reading in one go: D2 Elliot Web Exploitation Framework 1.14, August 7 2018 D2 Elliot has been updated with 11 new web exploits. Payloads and workflows
Welcome to E-SPIN Procurement
Acunetix web vulnerability scanner is one of the popular and widely use application security testing (AST) tool in the cyber security market, capable to perform both dynamic application security testing (DAST), black box testing and gray box testing (with AcuSenor deployed for Java, PHP, .NET platform supported), as well as Web Application Penetration Testing (with

What is Container Security and Issues ?

Container is a solution to the problem of how to obtain reliable software when moving from one computing environment to another. This may be from a developer’s laptop for testing environment, from staging environment to production, and possibly from a physical machine in a data center to a virtual machine in a private or public
Tagged under:
How APM Works and future of APM, Supply Chain Security Standards

Supply Chain Security Standards

Standards let you agree with other supply chain partners on how to handle security. Such standards need to be effective and easy to implement. They should also be compatible, where possible. For example, the approach taken by the UK has been to enforce cargo checks at the point of origin, then prevent tampering at any
Rise of Docker and Application Container Security Platform - App Container vs VM, Protecting Your Supply Chain: Security and Risk Management
Security is extremely important for all businesses. Companies who do not take supply chain security seriously leave themselves vulnerable to potentially devastating attacks. Before we jump into the details, lets first define what supply chain security is. Supply chain security is a broad term that encompasses the efforts to reduce the risk of both external
Web Application Security Assessment (WASA) as a Service Product Overview by E-SPIN
30-Jul-2018 Acunetix v12 release latest build update for existing customer and for new customer. Release Overview This new build adds detection for vulnerabilities in Cisco ASA, Apache Tomcat, Altassian Jira, Spring, JBoss and misconfigured nginx installations. The new build also includes HTTP Responses in the vulnerability alerts, and re-introduces manual intervention in the Login Sequence