Syndicated Blog

SecureIQLab
Bridging the Cloud Security Intelligence Gap
Exploits, Vulnerabilities and Payloads – Who Knew?

Exploits, Vulnerabilities and Payloads – Who Knew?

| | Informative
I can’t count how many times I’ve heard vulnerabilities called exploits and exploits called vulnerabilities. I’ve even heard payloads called exploits or vulnerabilities. That’s okay for an exploit if the exploit is ...
Exploits, Vulnerabilities and Payloads – Who Knew?

Exploits, Vulnerabilities and Payloads – Who Knew?

| | Informative
I can’t count how many times I’ve heard vulnerabilities called exploits and exploits called vulnerabilities. I’ve even heard payloads called exploits or vulnerabilities. That’s okay for an exploit if the exploit is ...
Brew Your Own ALE

Brew Your Own ALE

| | Informative
When we at SecureIQLab test security products, we go above and beyond reporting efficacy and cost; we also quantify operational efficiency and a metric we call ROSI: Return on Security Investment. Operational ...
Brew Your Own ALE

Brew Your Own ALE

| | Informative
When we at SecureIQLab test security products, we go above and beyond reporting efficacy and cost; we also quantify operational efficiency and a metric we call ROSI: Return on Security Investment. Operational ...
Support Your Local Pub By Using ALE

Support Your Local Pub By Using ALE

| | Informative
For a time when I worked at Microsoft, in my department, the booze cart would come by every Friday afternoon for happy hour, and we’d get free alcoholic beverages. The legal department ...
Support Your Local Pub By Using ALE

Support Your Local Pub By Using ALE

| | Informative
For a time when I worked at Microsoft, in my department, the booze cart would come by every Friday afternoon for happy hour, and we’d get free alcoholic beverages. The legal department ...
WAAP Pricing Considerations

WAAP Pricing Considerations

| | Informative
Comparing prices for Web Application and API Protection (WAAP) solutions often feels like comparing apples to oranges… to Cybertrucks. Vendors often offer public pricing for their lower-tier offerings, but enterprise-class WAAP solutions ...
WAAP Pricing Considerations

WAAP Pricing Considerations

| | Informative
Comparing prices for Web Application and API Protection (WAAP) solutions often feels like comparing apples to oranges… to Cybertrucks. Vendors often offer public pricing for their lower-tier offerings, but enterprise-class WAAP solutions ...
Are You Configured for Failure?

Are You Configured for Failure?

| | Informative
Every year, an exorbitant amount of money is spent on ensuring companies’ digital safety, yet data breaches continue to rise. Three main reasons cause this unfortunate event: First, companies often misconfigured the ...
Are You Configured for Failure?

Are You Configured for Failure?

| | Informative
Every year, an exorbitant amount of money is spent on ensuring companies’ digital safety, yet data breaches continue to rise. Three main reasons cause this unfortunate event: First, companies often misconfigured the ...