Today’s whitelisted applications are tomorrow’s security breaches

You may have seen the news last week, but if you haven’t, let me bring you up to speed. The research team at PerimeterX disclosed a “CSP bypass” involving the use of Google Analytics. Naturally, this generated a lot of buzz - which is great if the nature of the ... Read More

Today’s whitelisted applications are tomorrow’s security breaches

You may have seen the news last week, but if you haven’t, let me bring you up to speed. The research team at PerimeterX disclosed a “CSP bypass” involving the use of Google Analytics. Naturally, this generated a lot of buzz - which is great if the nature of the ... Read More

When is a “CSP bypass” not a CSP bypass?

You may have seen the news last week, but if you haven’t, let me bring you up to speed. The research team at PerimeterX disclosed a “CSP bypass” involving the use of Google Analytics. Naturally, this generated a lot of buzz - which is great if the nature of the ... Read More