In AppSec, ‘Fast’ Is Everything
The world has shifted. The SAST and DAST tools that were invented over a decade ago are no longer viable approaches to application security.
How To Hack A Human
Check out social engineering expert and founder of the DEF CON Social Engineering Capture the Flag contest Chris Hadnagy's recent interview on Dark Reading Radio.
Shellshocked: A Future Of ‘Hair On Fire’ Bugs
Most computers affected by Bash will be updated within 10 years. The rest will be vulnerable for the lifespans of all humans now living. This should concern us. But then, global warming should also concern us.
An AppSec Report Card: Developers Barely Passing
A new study reveals that application developers are getting failing grades when it comes to their knowledge of critical security such as how to protect sensitive data, Web services, and threat modeling.
Why Email Is Worth Saving
What if an Internet-scale, federated policy, authentication, and enforcement framework for trusted email delivery were available? It is.
Black Hat & DEF CON: 3 Lessons From A Newbie
Security conferences are a lot like metal concerts: Your parents are terrified you're going to die because everyone looks scary, but 98 percent of attendees are really nice people who want to help you learn.
No End In Sight For Ransomware
The screenlocker Kovter, in particular, has shown sharp growth this year. It masquerades as a law enforcement authority and threatens police action if users don’t pay up.
In Cloud We Trust: A New Model
The solution to the problem of data security in the public cloud will require more than a traditional compliance-driven approach.
All In For The Coming World of 'Things'
At a Black Hat round table, experts discuss the strategies necessary to lock down the Internet of Things, the most game-changing concept in Internet history.
Debugging The Myths Of Heartbleed
Does Heartbleed really wreak havoc without a trace? The media and many technical sites seemed convinced of this, but some of us were skeptical.