The Evaluation: Stage 4 – Determining the Outcome

Wrapping up this series on evaluating technologies and services is actually fairly simple. Determining the outcome of an evaluation is, in fact, mechanical. That is to say, that you shouldn’t have any emotion or subjectivity in your determination… Continue reading The Evaluation: Stage 4 – Determining the Outcome

Verizon Data Breach Report: Espionage, C-Suite and Cloud Attacks on the Rise

Cloud misconfigurations, business email compromise (BEC) and intellectual property theft are all up in the Verizon DBIR 2019 from last year. Continue reading Verizon Data Breach Report: Espionage, C-Suite and Cloud Attacks on the Rise

April 30, 2019 – Hack Naked News #216

    This week, how a politicians’ kids accessed his laptop through facial recognition, critical flaws in WordPress and Qualcomm chips, how 2 million IoT security cameras and baby monitors are vulnerable to takeover, and how a new Emotet variant u… Continue reading April 30, 2019 – Hack Naked News #216

Video: Safe Harbor for Hackers

Join the Disclose.io Movement!
Video and Slide Deck from EH-Net Live! April 2019
The Internet has an Auto-Immune Problem! It affects everyone on the planet, whether they’ve been the victim of a cyber-attack directly or not. Even those who have ne… Continue reading Video: Safe Harbor for Hackers

Dave Kennedy, Binary Defense – Enterprise Security Weekly #134

Security Legend Dave Kennedy sits down with our Founder and CTO Paul Asadoorian at InfoSec World 2019 to discuss his company Binary Defense and how they’re helping the Security community! A great conversation between two security legends and long… Continue reading Dave Kennedy, Binary Defense – Enterprise Security Weekly #134

Docker, ARM, & “Selfie” – Application Security Weekly #56

    In the News segment, The Matrix turns 20, Containers are Weakest Security Leak Again, The Evolution of Application Security in the Serverless World, and more! News Bugs, Breaches, and Bounties! Envoy NULL character injection Envoy path traversal &#… Continue reading Docker, ARM, & “Selfie” – Application Security Weekly #56

Video: Inside the MSRC – Blue Team, Bug Bounties & IR

See Security Done the Microsoft Way!
Video and Slide Deck from EH-Net Live! March 2019
So… here we are. For many of us, it’s been a brutal winter. As bad as it was, we survived! We’re only a few days into Spring, but it’s spring… Continue reading Video: Inside the MSRC – Blue Team, Bug Bounties & IR

Endgame, Virsec, & SCYTHE – Enterprise Security Weekly #130

Paul Asadoorian and Matt Alderman recorded interviews with the following vendors at RSA Conference 2019: – Endgame – Virsec – SCYTHE Full Show Notes Visit http://securityweekly.com/esw for all the latest episodes! Hosts
The post Endga… Continue reading Endgame, Virsec, & SCYTHE – Enterprise Security Weekly #130