03 Mar Ethical Hacking It’s Hard to Spell Security with API (Translation: You Need an AppSec Strategy) March 3, 2022 By John Verry 0 comments The rapid growth of APIs has led to significant security risks. Unless you have been marooned on an u...Continue reading
09 Aug InfoSec Strategies IoT Devices: The Lord Giveth and He Taketh Away August 9, 2021 By John Verry 0 comments News flash for those who have been asleep for the last few years—there are a lot of security issues in IoT. When an issue rises to t...Continue reading
27 Mar IoT Security What is an IoT Ecosystem and How Do You Test One? March 27, 2021 By Richard Barrus 0 comments Anybody who is involved with securing or validating Internet of Things (IoT) solutions knows that they often involve a web of connecti...Continue reading
26 Mar IoT Security OWASP ISVS vs. CSA IoT Security Controls Framework – Which to Use When March 26, 2021 By Richard Barrus 0 comments If you’re involved in information security, especially as a developer, you’ve likely come across the OWASP Foundation, a leading provi...Continue reading
25 Mar IoT Security OWASP ISVS Levels Explained March 25, 2021 By Richard Barrus 0 comments As a cybersecurity professional, you’ve probably heard of the nonprofit OWASP Foundation, a prominent authority on application securit...Continue reading