The Business Value of the Social-Engineer Phishing Service

Phishing attacks continue to plague organizations across the globe with great success, but why? Cybercriminals are targeting the human element of organizations.  Additionally, they are developing techniques to use an…
The post The Business Value of t… Continue reading The Business Value of the Social-Engineer Phishing Service

Top security threats for power plants and how to proactively avoid them

Power plants are one of the most vitally important components of modern civilization’s infrastructure. A disruption in energy production impacts all aspects of society from healthcare to national security. Eliminating a country’s ability to generate en… Continue reading Top security threats for power plants and how to proactively avoid them

Counterfit: Open-source tool for testing the security of AI systems

After developing a tool for testing the security of its own AI systems and assessing them for vulnerabilities, Microsoft has decided to open-source it to help organizations verify that that the algorithms they use are “robust, reliable, and trust… Continue reading Counterfit: Open-source tool for testing the security of AI systems

MindAPI makes API security research and testing easier

Security researcher David Sopas has published a new open-source project: MindAPI, a mind map with resources for making API security research easier. “I love mind maps. They help me create a fine-tuned methodology and keep the mind organized,&#822… Continue reading MindAPI makes API security research and testing easier

Product showcase: Pentest Robots

Security testing automation is not about building tech to replace humans. We don’t adhere to that limiting view because it fails to capture the complexity and depth of security testing. Instead, we believe automation should enhance uniquely human abili… Continue reading Product showcase: Pentest Robots

Addressing the lack of knowledge around pen testing

The vast majority of attackers are opportunist criminals looking for easy targets to maximize their profits. If defenses are sufficiently fortified, finding a way through will be so difficult and time consuming that all but the most elite nation-state … Continue reading Addressing the lack of knowledge around pen testing

Addressing the lack of knowledge around pen testing

The vast majority of attackers are opportunist criminals looking for easy targets to maximize their profits. If defenses are sufficiently fortified, finding a way through will be so difficult and time consuming that all but the most elite nation-state … Continue reading Addressing the lack of knowledge around pen testing

New Article on How to Start with DevSecOps

Github just published an informative guide to moving to DevSecOps.The Github article makes good points and provides clarification on how to shift left
The post New Article on How to Start with DevSecOps appeared first on K2io.
The post New Article on H… Continue reading New Article on How to Start with DevSecOps

How Does Deterministic Security Help Reduce False Positives?

Some organizations are reluctant to block attacks based on their security tool alerts because of the false positives being generated, in this article we take a look at how deterministic security helps to eliminate false positives.
The post How Does Det… Continue reading How Does Deterministic Security Help Reduce False Positives?

Why Block Attackers at the Network Edge?

Many still consider their network security devices sufficient security for their web applications.  Is the difference between network security and web application security a bit of a puzzle for you? If so, you’re not alone.
The post Why Block Attackers… Continue reading Why Block Attackers at the Network Edge?