How Security Can Better Support Software Engineering Teams

As the CISO at a tech company (Axonius), my responsibilities include empowering our software engineering teams to maintain a strong security posture of our products. While everyone agrees that security is important, the different incentives of security and engineering teams can make it harder to collaborate. Here’s some advice on weaving security into the software…

Read more

October 5, 2023
Read More >>

Cartographer – Advanced Code Coverage Mapping in Ghidra

Introduction There’s no doubt that reverse engineering can be a very complex and confusing matter, even for those that love doing it. Jumping into a program and being greeted with tons of assembly and weirdly-named functions and variables is hardly what most would call a fun time. Not to mention that identifying specific functionality in […]

October 2, 2023
Read More >>

A Report Template for Incident Response

Preparing for cybersecurity and data privacy incidents involves creating checklists and documented plans to enable the response team to do their best during the incident. Preparation also includes creating a template that the team can use as the basis for the incident report, which is critical to ensuring that the incident is handled well. We…

Read more

September 13, 2023
Read More >>

Security Leaders Can Lower Expenses While Reducing Risk

As companies seek to optimize operations and constrain expenses, cybersecurity leaders worry about funding the projects we consider essential. Fortunately, in such an economic climate, we can achieve an outcome that benefits the organization from cybersecurity as well as financial perspectives. Here’s how. Start by critically reviewing how you’ll spend the security funds; this involves…

Read more

August 23, 2023
Read More >>

Withholding Single Sign-On from SaaS Customers is Bad for Business and Security

Despite years of public shaming by security professionals, some SaaS vendors only offer Single Sign-On (SSO) in high-end “enterprise” product tiers. By withholding this capability from smaller organizations, they put customers’ security at risk. Moreover, they base a pricing strategy on a weak signal and miss an opportunity to lower their own security risk. Charging…

Read more

May 26, 2023
Read More >>

Withholding Single Sign-On from SaaS Customers is Bad for Business and Security

Despite years of public shaming by security professionals, some SaaS vendors only offer Single Sign-On (SSO) in high-end “enterprise” product tiers. By withholding this capability from smaller organizations, they put customers’ security at risk. Moreover, they base a pricing strategy on a weak signal and miss an opportunity to lower their own security risk. Charging…

Read more

May 26, 2023
Read More >>

Certified Ethical Hacker (CEH) Cheatsheet

What is Certified Ethical Hacker (CEH) The Certified Ethical Hacker (CEH) is a prestigious professional…
Certified Ethical Hacker (CEH) Cheatsheet on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses.

May 20, 2023
Read More >>

The AI Attack Surface Map v1.0

Introduction Purpose Components Attacks Discussion Summary Introduction This resource is a first thrust at a framework for thinking about how to attack AI systems. At the time of writing, GPT-4 has only been out for a couple of months, and ChatGPT for only 6 months. So things are very early. There has been, of course, much content on…

May 16, 2023
Read More >>

Three Ways CISOs Can Drive More Meaningful Collaboration

Today’s CISOs are more than technologists—we strive to make ourselves well-rounded business leaders. This involves aligning our efforts with business objectives and collaborating with colleagues who are not experts in IT or security. In fact, Gartner’s research found that top-performing CISOs regularly meet with three times as many non-IT stakeholders as they do with IT…

Read more

May 16, 2023
Read More >>