Inside the mind of a black-hat hacker
07
May
2023

Inside the mind of a black-hat hacker

What does a black-hat hacker look like? The word probably conjures up a picture of a hoodie-wearing computer genius hacking…

Google and Apple cooperate to address unwanted tracking
07
May
2023

Google and Apple cooperate to address unwanted tracking

Google and Apple want to create a specification for tech that alerts users when they’re being tracked by AirTags and…

Microsoft vs Google spat sees users rolling back security updates to fix browser issues
07
May
2023

Microsoft vs Google spat sees users rolling back security updates to fix browser issues

We take a look at trouble brewing in browser land after a controversial Windows update leaves Chrome fans without a…

Crowdsourcing Racial Justice and Equality
07
May
2023

Crowdsourcing Racial Justice and Equality

Black Lives Matter.  During this time, I find myself with a mix of emotions that makes it difficult to focus….

Strengths and Vulnerabilities of AI Applications to Health Care
07
May
2023

Strengths and Vulnerabilities of AI Applications to Health Care

By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC Artificial intelligence (AI) has made significant…

2023 Predictions
06
May
2023

2023 Predictions – Cyber Defense Magazine

By Anurag Gurtu, Chief Product Officer at Strike Ready In 2022, the global average total breach cost surpassed $4.35M, and…

Risto Siilasmaa
06
May
2023

Risto Siilasmaa: “We have to assume that the bad guys will get in”

Risto Siilasmaa is a pioneer in IT security and one of Detectify’s early investors. He is well-known for founding the…

h1-2006 CTF | HackerOne
06
May
2023

h1-2006 CTF | HackerOne

Hello hackers!  Thanks to all of you who participated in our #h1-2006 CTF!  We had a lot of fun building it,…

OWASP TOP 10: Broken Access Control
06
May
2023

OWASP TOP 10: Insufficient Logging and Monitoring

Insufficient Logging and Monitoring is one of the categories on OWASP‘s Top 10 list and covers the lack of best…

How does Pentesting fit into your overall security strategy?
06
May
2023

How does Pentesting fit into your overall security strategy?

Digital transformation has proven that every business is now a software business. In fact, using digital technology to create new…

OWASP TOP 10: Broken Access Control
06
May
2023

OWASP TOP 10: Broken Access Control

Update: Broken Access Control is proposed to be number one on the new OWASP Top 10 list of 2021. The…

Scaling & Prioritizing Product Security with Zendesk
06
May
2023

Scaling & Prioritizing Product Security with Zendesk

Zendesk, Inc. (NYSE: ZEN) is one of the fastest-growing customer support platforms in the world. With over 150,000 customer accounts…