Hacking Vegas at DEF CON 2017

by Max Chauhan on August 10, 2017 at 3:37 PM

For a quarter of a century now, thousands have gathered each year at the end of July in Las Vegas for one of the world’s largest hacker conventions – DEF CON. This year, DEF CON attracted a record-breaking 25,000...

As the number of mobile device users increases each year, the concern of mobile security becomes more critical than ever. Mobile security is the protection of portable devices such as laptops, smartphones, tablets, and...

Lazy Days in the Cloud

by Joe Basirico on August 2, 2017 at 10:30 AM

The cloud brings scalability, reliability and security features that allow companies of all sizes to run their online business efficiently.  These powerful capabilities often bring a false sense of a “security is already...

Open Source Software (OSS) has become increasingly popular in the enterprise these days. The GitHub Open Source Survey [1] indicates that 84% of the respondents said their employers accept or encourage the use of open...

Buzzword Sink or Swim?

by Ed Adams on July 18, 2017 at 10:00 AM

In the cyber world, we have an odd propensity to define everything as new and/or a breakthrough.  While having spent the last 20 years of my career in this space, my mechanical engineering degree rears its ugly head and...

The Promise & The Peril of HTML5

by Kevin Poniatowski on June 26, 2017 at 12:30 PM

Like many software engineers, I love new toys. New programming languages allow us to create new features quickly, while handling tedious overhead issues, making it so we don’t have to think about them.   However, in this...

There are a set of best practices that can be used to build security into applications that use databases to send, retrieve, and store data including appropriate input validation and the use of prepared statements.  You...

While Cloud applications are vulnerable to many of the traditional threats described by OWASP and the CWE dictionary, there are also unique threats that development teams must understand in order to properly mitigate risk...

The OWASP Top 10 groups common web application vulnerabilities into broad categories, helping to focus teams on key web application security activities. On the surface, this makes sense. I teach a Web Application Security...

The Internet of Things (IoT) is growing at such a fast rate that it can feel out of control. Almost 23 billion devices will be connected by 2021, tripled from 2016. With such explosive growth, where everything from...