Information Security Leader, Author, Instructor and Speaker

Default utility Image

How to mitigate an HTTP request smuggling vulnerability TAGS: | | Load balancers play a crucial role in modern web architectures. In addition to managing the routing of traffic, they also …Continue reading →

Default utility Image

IDC PlanScape: Threat Hunting TAGS: | | “Threat hunting is the latest trend in cybersecurity analytics,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). …Continue reading →

Default utility Image

Defense Department Puts Bounty on Bugs TAGS: | | Cold hard cash is a strong motivator for many people and the Department of Defense is hoping that hackers are …Continue reading →

Default utility Image

Vulnerability Assessments Reveal Security Weaknesses TAGS: | How confident are you that your network is secure and that hackers aren’t lurking on a server, lying in wait …Continue reading →

Default utility Image

Choose the Best Vulnerability Assessment Tools TAGS: | Security vulnerabilities exist in every organization. The sheer volume of operating system, application and infrastructure security alerts announced each day …Continue reading →

Default utility Image

Getting Started with Automated Penetration Testing TAGS: | | | | The automated penetration test plays an important role in the security professional’s toolkit. As part of a comprehensive security program, …Continue reading →

Default utility Image

Building a Vulnerability Management Program TAGS: | How vulnerable are your IT systems to an electronic intrusion?  If you think you’re safe, what evidence do you have …Continue reading →