Information Security Leader, Author, Instructor and Speaker

Default utility Image

How to mitigate an HTTP request smuggling vulnerability TAGS: | | Load balancers play a crucial role in modern web architectures. In addition to managing the routing of traffic, they also …Continue reading →

Default utility Image

Don’t Be Victimized by a Supply Chain Attack TAGS: Six years ago, a major U.S. retailer suffered one of the most famous data breaches in history. Attackers compromised the …Continue reading →

Default utility Image

Defense Department Puts Bounty on Bugs TAGS: | | Cold hard cash is a strong motivator for many people and the Department of Defense is hoping that hackers are …Continue reading →

Default utility Image

PCI DSS Compliance Health Check TAGS: | | | How are you doing with PCI DSS compliance? Have you taken a close look at your controls recently to ensure …Continue reading →