Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
The Use of Generative AI in DevOps
{Latest Posts}
The State of Server-Side Request Forgery Risks in 2022
Perhaps one of the best Black Hat talks in recent years was renowned web security researcher Orange Tsai’s presentation about bypassing Server-Side Request Forgery (SSRF) defenses. Together with his team, Tsai proposed a “very general
Why Data Protection Must Be a Part of Every Cybersecurity Strategy
Widespread transition to remote/hybrid work creates vast opportunities for cyber attackers. With much more data being stored in the cloud and employees toiling away in less-secure home-office environments, ransomware attacks have skyrocketed. All told, ransomware
Application Security Should Be A Badge Of Honor, Not A Wall Of Shame
Cybersecurity news is a curious thing. For the most part it’s bad news. Companies have been breached, risks are ever increasing and another billion-dollar crypto raid is under investigation. Feels like we have enough to
Fixing Vulnerabilities at Speed—How Engineering and Security Can Achieve True DevSecOps
What happens when two distinct teams with varied technological expertise, different incentive structures and contrasting priorities converge?—the answer is usually tension. During a recent discussion with colleagues, a completely different result was experienced. ‘Camaraderie’ is
Addressing the Challenges of Securing Hybrid Cloud Access: What You Need to Know
For a growing number of companies, a blend of public cloud services, private clouds, and on-premises infrastructure offer the best solution to the benefits and limitations of each. Cloud adoption is growing, and the past
Single Sign-On: Balancing Power and Responsibility
Single Sign-On (SSO) is a powerful productivity tool for organizations today. Facilitating access to on-premises and cloud-based applications, it dramatically simplifies the user experience. With SSO, users simply logon once, open a web browser or
Why it’s Time to Adopt a Risk-Based Approach to AppSec
Today, AppSec (Application Security) is not only about compliance with regulatory frameworks. In the face of newer threats, a growing attack surface, and the lack of AppSec talent, legacy WAF solutions and traditional security approaches
Digital ID Proofing: Testing…Now Complete
Digital Identity (ID) Proofing—also known as digital identity authentication or digital ID verification using computer technology—is an increasingly important aspect of online security. Even if you’re doing business only online, you still need to be