6 min read - There’s too much to test, and not enough time. Here's one way to get to the "interesting" stuff faster.
5 min read - Consider banning or restricting use of classic-Bluetooth devices in your organization.
6 min read - Don't make the mistake of putting all your trust in AI to secure your systems. Take these lessons from the BlackBerry Cylance hack to heart.
5 min read - Traditional methods for injecting secrets may create risks due to the architectures of serverless frameworks. Here are alternatives to consider.
6 min read - Your users are picking up spare cables in conference rooms, or buying generic cables on Amazon. Think about that for a moment—now panic.
5 min read - Here's how to use negative testing to bolster the security of your web APIs—and your software overall.
Join us at our first Seattle conference to engage with leading DevOps and IT Security pros for a two-day exploration of DevSecOps, Sept. 16-18.
5 min read - Cloud-native zero-trust is shining a light on the path out of a cybersecurity quagmire. Here are emerging best practices from Black Hat.
5 min read - Insider threats come in many forms. How bribable are your employees?
5 min read - Two new bugs—now fixed—show how single sign-on systems can fall prey to attackers. Here's what went wrong, and what you can learn from it.