Application Security

Application Security

Photos from Microsoft Ignite 2018

Microsoft Ignite 2018: Celebrating the Office 365 Community

| | events, office 365
After exhibiting at this year's Microsoft Ignite, we’re even more energized by the growth of the Microsoft community. For us, one of the best parts of the show was meeting our amazing ...
Silencing Firefox’s Chattiness for Web App Testing

Silencing Firefox’s Chattiness for Web App Testing

| | Penetration Testing
Firefox is one chatty browser! Even if you don’t actually use it for anything, it’s constantly making requests out to the internet for things like updates, checking network status, and sending telemetry ...
DevSecOps Automation? The Roadmap

DevSecOps Automation? The Roadmap

In my previous blog post, I addressed the need and the process of creating applications faster and building an adaptive infrastructure that suits my real consumption. Today I will highlight how automation ...
Free Course Promo-nologo

Free Osquery Training Course Now On-Demand

I’m excited to share that we have just released free online training to introduce you to osquery. Our goal was to combine quick setup and hands on labs with complete accessibility, so ...
DevOps: Application Automation? The Inescapable Path

DevOps: Application Automation? The Inescapable Path

The world is changing. IoT is becoming more and applications hold a prominent place in this new world. As IT infrastructure carries a huge cost and we need to find a way ...
10 Tips to Take Control of Your Public Wi-Fi Security

10 Tips to Take Control of Your Public Wi-Fi Security

The amazing ability to surf from anywhere sometimes distracts us from a very basic fact: the information may flow to us – but it can flow from us, in other, undesirable directions.So ...
Protect your employees from phishing and social engineering | NCSAM at Synopsys

Protect your employees from phishing and social engineering | NCSAM at Synopsys

It was a busy summer for healthcare IT staff. The Minnesota Department of Human Services potentially breached 21,000 patients’ personal data. Gold Coast Health Plan emailed 37,000 patients to warn them their ...

SSD Advisory – Firefox JavaScript Type Confusion RCE

Vulnerabilities Summary A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write, which leads to remote code execution inside the sandboxed content process ...

Not Just Another Notch in Your Belt: Organizational Challenges of PCI Compliance

| | Penetration Testing
As an account manager in the world of security, I am constantly confronted with questions surrounding PCI compliance and the challenges organizations face with ensuring proper controls are in place, and all ...
Learn 10 Key Tips to Make Your Software Security Program Thrive

Learn 10 Key Tips to Make Your Software Security Program Thrive

The DevOps era brings together skyrocketing complexity with white-hot speed of delivery to create growing value and responsiveness in software design. Companies such as Amazon deploy code every 11 seconds, while Facebook ...
Loading...