Do you worry that there are bad people accessing your networks? If you think your systems have already been compromised you’re going to want to know how and by how much. In this interview, Peter Cohen at MWR Countercept explains the art of threat hunting – a proactive rather than reactive approach that doesn’t rely on the attacker tripping alarms…. Read more »
Open source code – in the form of libraries and frameworks – plays an important role in much of today’s software development. But it’s not without its risks. Many people assume that the open nature of the code means that it is heavily scrutinised and that , according to Linus’ Law, “given enough eyeballs, all bugs are shallow”. But open source… Read more »
» Listen or download now on the podcasts page » Is the real threat to our security APTs or apathy? We all know that the software on our systems contains vulnerabilities and needs constant patching. And malware generally attacks well-known vulnerabilities that we have the ability to fix. So why isn’t it done? “If you can implement a good vulnerability management programme,… Read more »
Security is a business and those of us who make a living from it, in some form or other, effectively profit from the fact that vulnerabilities get exploited by bad people. But is there a moral or ethical limit to how you turn insecurity into money? ReVuln, a security company based in Malta, claims to have found nine zero-day vulnerabilities… Read more »