Start of a pentesting methodology by bugcrowd.com.  So many areas to test but there is a lot included in the graphic.

 

You understand the value of security penetration testing for your software applications and it’s been successful identifying important vulnerabilities.  You do the obvious thing, order more pentesting but in successive tests the arrival rate of new application vulnerabilities soon exceeds your technical teams ability to remediate them.  Management and technical teams security vulnerability epiphany soon turns to malaise as security becomes increasingly marginalized in favor of progressing against more tangible objectives – customer facing software features.  What happened?  Could this have played out differently?

Read more

The following Slide Share deck, OWASP DeepViolet TLS/SSL Java API and Tools, is one I provided to Black Hat staff after my live tool demonstration of the OWASP DeepViolet project at the Black Hat 2016 EU London Tools Arsenal.  The deck was never shown at the event but I developed it as a way to communicate the value of the DeepViolet quickly to those who many be interested but did not attend.

In a recent blog post, Security Economics of the Internet of Things on Schneier on Security, security expert and cryptologist Bruce Schneier describes economics related to securing IoT devices.  The post was written due to unprecedented DDOS attacks against investigative security journalist Brian Krebs and his web site krebsonsecurity.com.

Read more