Addressing the Rising Threat of API Leaks
In the realm of cybersecurity, the metaphor of “Leaky Buckets” has become an increasingly prevalent concern, particularly in the context of API security. This term…
In the realm of cybersecurity, the metaphor of “Leaky Buckets” has become an increasingly prevalent concern, particularly in the context of API security. This term…
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original…
I’ve had to make rule for my events: The first person to mention AI owes everyone else a drink. It’s a bubble. Tech bubbles come…
The last few years I’ve been struggling to find time and energy to actively contribute to the information security community. I used to go to…
In order for AppSec and ProdSec teams to stay on top of their growing attack surface, they must understand what parts of their attack surface…
We’ve made several improvements to the attack surface data visible from the overview, such as new IPs and both covered and uncovered assets. We’ve also…
It’s nearing the end of 2023, and we’ve recently published a report, “State of EASM 2023”, offering insights into the state of attack surfaces across…
While remote work has its benefits, it also poses the challenge of keeping employees engaged and fostering cross-functional awareness. To tackle this issue, we maintained…
I recently hosted and moderated a distinguished panel of Chief Information Security Officers (CISOs) – Nitin Raina, CISO at ThoughtWorks, Mike Wilkes, former CISO at…
I have a dead-simple diagnostic tool for 2024. Ask yourself how you feel about Mondays. Too many of us dread them. The meetings. The meetings…
Humans are meant to think and share their thoughts in writing, audio, and video. The fact that this is called “podcasting”, or “blogging”, or “being…
Why VDP and Bug Bounty? Mohamed Bensakrane was able to use VDP as a way to establish a point of contact with hackers, as well…