Wesam Alzahir used a reverse engineering process to identify vulnerabilities in thermal printers – and it shows us how useful reverse engineering is to give companies a more complete understanding of their attack surface.
Wesam Alzahir used a reverse engineering process to identify vulnerabilities in thermal printers – and it shows us how useful reverse engineering is to give companies a more complete understanding of their attack surface.
An interview with Michael Montoya (CISO at Equinix). He shares his perspective on changes in cybersecurity and the positive impact of security advocates.
In this interview, Daniel Maloney (SVP and Chief Security Officer at Verizon) shares the basics of getting out ahead of a threat, and reminds us that there’s no singular way to protect everything.
It’s a misconception that cloud-based environments are inherently secure. Security operations for the cloud should include proactive threat hunting – and Gabrielle Hempel explains how to implement this.