IE11 Goes to Zero — A History of Browser Security and Bug Bounties – ASW #201
IE has gone to 11 and is no more. There’s some notable history related to IE11 and bug bounty programs. In 2008, Katie Moussouris and…
IE has gone to 11 and is no more. There’s some notable history related to IE11 and bug bounty programs. In 2008, Katie Moussouris and…
We can create top 10 lists and we can count vulns that we find with scanners and pen tests, but those aren’t effective metrics for…
Sponsored By Visit https://www.cybereason.com/cisostories for more information! For security leaders, it can be hard to catch a break when faced with the increasingly challenging task…
The Business Information Security Officer, or BISO, is relatively new and somewhat controversial role. Does this role act as the CISO’s non-technical liaison to the…
Lots of web hacking can be done directly from the browser. Throw in a proxy like Burp plus the browser’s developer tools window and you’ve…
One of the key features of cryptocurrency, NFTs, and other blockchain-based technologies is the immutable ledger. Put another way, there’s no clear way to implement…
Passwordless is everywhere these days, but like most new security markets, it’s shrouded in confusion. There are already dozens of vendors promising to kill the…
We cover a lot of articles about CISO leadership, communications, skills, and yes, transition. This week we discuss the CISO transition from a CISO’s perspective….
The Security Weekly 25 Index hits an all-time high for the third straight quarter! In this segment, Matt, Jason, and Ben break down the cybersecurity…
Filter By:
Attack Surface Management & Experience in the Age of Security – ESW #279
Over the past year, we’ve seen more buzz develop around attack surface management. In fact, major analyst firms Forrester and Gartner recently released research about…