Vulnerability Assessment

November 18, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 2 – Testing

Welcome back! In part 1 of REST Assured blog series, we discussed the definitions and history behind APIs, and we...

Read More
November 14, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 1 – Introduction & Configuration

Introduction: Hello and welcome to our 3-part blog series where we will take a dive into the technical aspects of...

Read More
July 18, 2018
A Tale Of Two Tools: When Splunk met SecurityCenter

Co-Authors:  Keith Rhea and Alex Nanthavong It was the best of times, it was the worst of times, it was...

Read More
June 10, 2018
Inherent Risk Tiering for Third-Party Vendor Assessments

It can be a challenging and overwhelming task to adequately manage the risk associated with outsourcing technology or business processes,...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
November 24, 2016
Stop by Booth 118 @ AWS re:Invent to Learn How We Can Secure Your Cloud

Read More
February 28, 2011
Tweet of the Year for 2011: What’s Wrong With Information Security

Last week, I read what I expect to be the most intelligent tweet of 2011.  A member of the OWASP...

Read More
November 15, 2010
Pen Testing Versus Vulnerability Assessments

At the end of the first day of plenary sessions at OWASP App Sec DC 2010, there was a session...

Read More