Exploits, Vulnerabilities and Payloads – Who Knew?

I can't count how many times I've heard vulnerabilities called exploits and exploits called vulnerabilities. I’ve even heard payloads called exploits or vulnerabilities. That's okay for an exploit if the…

Comments Off on Exploits, Vulnerabilities and Payloads – Who Knew?

Brew Your Own ALE

When we at SecureIQLab test security products, we go above and beyond reporting efficacy and cost; we also quantify operational efficiency and a metric we call ROSI: Return on Security…

Comments Off on Brew Your Own ALE

Support Your Local Pub By Using ALE

For a time when I worked at Microsoft, in my department, the booze cart would come by every Friday afternoon for happy hour, and we'd get free alcoholic beverages. The…

Comments Off on Support Your Local Pub By Using ALE

WAAP Pricing Considerations

Comparing prices for Web Application and API Protection (WAAP) solutions often feels like comparing apples to oranges… to Cybertrucks. Vendors often offer public pricing for their lower-tier offerings, but enterprise-class…

Comments Off on WAAP Pricing Considerations

Are You Configured for Failure?

Every year, an exorbitant amount of money is spent on ensuring companies' digital safety, yet data breaches continue to rise. Three main reasons cause this unfortunate event: First, companies often…

Comments Off on Are You Configured for Failure?

Spooky Action from a Distance

The first question that popped into my mind when I became aware of the global IT chaos that started this Friday and the corresponding causes that were articulated was, "How…

Comments Off on Spooky Action from a Distance

Pledge vs Reality – Secure by Design

A few weeks ago, I stumbled upon the website of a company that has recently nominated itself to be part of the "Secure of Design," an endeavor championed by the…

Comments Off on Pledge vs Reality – Secure by Design

To Breach or Not to Breach

The rapid adoption of could computing was yesterday’s news 5 years ago. Today’s news is that one of the most critical cloud security technologies is woefully ineffective. In addition to…

Comments Off on To Breach or Not to Breach

Efficiency is All You Need

A chance encounter with Texas’s beloved company’s Chief Human resources officers tempted me to ask a candid question. The question was a question that lots of sales engineers will be…

Comments Off on Efficiency is All You Need