AWS S3 Outage and Critical Infrastructure Attacks
Yesterday the AWS team released a summary of why their S3 services in the Northern Virginia (US-EAST1) region were disrupted and some of...
Characterizing the Friction and Incompatibility Between IoC and AI
Many organizations are struggling to overcome key conceptual differences between today’s AI powered threat detection systems and legacy...
Bug Bounty Programs: Are You Ready? - part 2
In this part we’ll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from
Security Automation Isn’t AI Security
The AI revolution is still relatively young in the InfoSec world. Despite endless floors of vendor booths displaying the latest security...
A Pentester’s Cache of 0-days
Much of the InfoSec would still struggles to understand the dynamics of 0-day vulnerabilities and the quandary of their widespread...
Ransomware Detection and Mitigation in 2017
With near unanimous agreement between InfoSec authors of 2017 security predictions, ransomware will continue to grow as the number-one...
What is a Pentest?
The demand for penetration testing and security assessment services worldwide has been growing year-on-year. Driven largely by...
InfoSec skills shortage: The No. 1 threat to Internet security
When asked a poorly bounded question such as “What is the biggest threat to Internet security?”, the majority of quick-fire answers can...