Category: Mix
Retail and e-commerce organizations are major targets this time of year, which is why proactive security testing is essential to…
CISOs often struggle with proving ROI from security initiatives when trying to secure buy-in from the board and prioritize budget….
The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper…
Originally published in Security Magazine When the pandemic hurled us into a cybersecurity crisis, there were some who held out…
Bug bounty hunting can seem overwhelming when you’re just starting, especially when you are coming from a non-technical background. And…
This blog will break down the NIS2 Directive drawing information from the original directive briefing published by the European Parliament…
As organizations continue adopting emerging technologies, they gain immense benefits but also face new security challenges. Cloud computing, AI, IoT,…
API abuse and web application bot attacks are often confused. This is understandable, as both involve automated interactions and are…
Recently a past student came to me with a very interesting unauthenticated vulnerability in a Spring application that they were…
If you weren’t lucky enough to catch us at a roadshow event, you’ll be delighted to know you can catch…
As cyber attackers refine their skills, their methods evolve to exploit vulnerabilities in innovative and increasingly difficult-to-detect ways. The modern…
Many Facets, One Goal A common trope in cybersecurity is “don’t roll your own auth.” There’s a reason for this: implementing…