Try our new research platform with insights from 80,000+ expert users

What are the threats associated with using ‘bogus’ cybersecurity tools?

Rony_Sklar - PeerSpot reviewer
Community Manager at a tech services company with 51-200 employees
  • 6
  • 140
PeerSpot user

13 Answers

Last answered Jan 24, 2023
DD
Principal Advisor at Pro4:Six CISO Services and Consulting
User
Jan 7, 2021
Search for a product comparison in Application Security Tools
SimonClark - PeerSpot reviewer
Cyber Security Advisor - Director at Fort Net UK
Real User
Top 5Leaderboard
Jan 8, 2021
DM
Chief Marketing Officer at JetPatch
Vendor
Jan 8, 2021
DM
Cybersecurity Solutions Architect Lead at a tech services company with 5,001-10,000 employees
Consultant
Jan 7, 2021
JM
Cyber Security Officer at Grupo Vision
Real User
Jan 7, 2021
JM
Cyber Security Officer at Grupo Vision
Real User
Jan 7, 2021

Assosiated threats are many, like data loss, data exfiltración, vlan hoppin, sensible data expossure, ransomeware, etc.

PeerSpot user
BD
Chief Information Security Officer at Abcl
Real User
Top 10
Jan 7, 2021
Find out what your peers are saying about SonarSource Sàrl, Checkmarx, Veracode and others in Application Security Tools. Updated: January 2026.
881,565 professionals have used our research since 2012.
CY
DevSecOps Evangelist & Coach at Shiftleft
Real User
Top 20
Jun 28, 2021
KB
Head of Services at Sistemar Tecnologias
User
Jan 12, 2021
JC
Network Security Engineer at Social Security Commission
Real User
Jan 8, 2021
AW
Works at a tech services company with 11-50 employees
Real User
Jan 8, 2021
Navcharan Singh - PeerSpot reviewer
Assistent Seo Manager at RTDS
MSP
Top 10Leaderboard
Jan 24, 2023
DV
Sales Engineer | Technical Sales | Pre-Sales at SUSE
Vendor
Jan 13, 2021
JR
Sr Systems Administrator at a comms service provider with 11-50 employees
User
Jan 11, 2021
Application Security Tools
Application Security Tools are designed to ensure the security of applications by identifying vulnerabilities and potential threats during development and operation phases. They play a crucial role in safeguarding data integrity and user privacy.These tools provide comprehensive security assessments and support for applications, focusing on identifying weaknesses in code and preventing threats. Users share insights about their effectiveness in real-world environments, emphasizing their value...
Download Application Security Tools ReportRead more

Related Q&As