Vulnerability Assessment

December 6, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 3 – Reporting

Welcome back to the REST Assured blog series for Part 3: Reporting. While often overlooked by security professionals, compiling reports...

Read More
November 18, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 2 – Testing

Welcome back! In part 1 of REST Assured blog series, we discussed the definitions and history behind APIs, and we...

Read More
November 14, 2018
REST Assured: Penetration Testing REST APIs Using Burp Suite: Part 1 – Introduction & Configuration

Introduction: Hello and welcome to our 3-part blog series where we will take a dive into the technical aspects of...

Read More
July 5, 2018
Hardware Vulnerability: Understanding Spectre, Meltdown and the Price of Unchecked Modernization

Firewalls, encryption, antivirus software, armed security guards, dual authentication and every other added security mechanism that exists to secure data,...

Read More
June 10, 2018
Inherent Risk Tiering for Third-Party Vendor Assessments

It can be a challenging and overwhelming task to adequately manage the risk associated with outsourcing technology or business processes,...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
March 18, 2011
Vulnerability Management White Paper

Recently, I was asked to put together a white paper describing some work we’ve done related to supporting a vulnerability...

Read More
February 28, 2011
Tweet of the Year for 2011: What’s Wrong With Information Security

Last week, I read what I expect to be the most intelligent tweet of 2011.  A member of the OWASP...

Read More
November 15, 2010
Pen Testing Versus Vulnerability Assessments

At the end of the first day of plenary sessions at OWASP App Sec DC 2010, there was a session...

Read More