03 Mar Ethical Hacking It’s Hard to Spell Security with API (Translation: You Need an AppSec Strategy) March 16, 2023 By John Verry The rapid growth of APIs has led to significant security risks. Unless you have been marooned on an uncharted coral atoll for the last ... Continue reading
09 Aug Compliance, Cybersecurity, InfoSec Strategies IoT Devices: The Lord Giveth and He Taketh Away March 16, 2023 By John Verry News flash for those who have been asleep for the last few years—there are a lot of security issues in IoT. When an issue rises to t... Continue reading
27 Mar Compliance, Cybersecurity, IoT Security What is an IoT Ecosystem and How Do You Test One? March 10, 2023 By Richard Barrus Anybody who is involved with securing or validating Internet of Things (IoT) solutions knows that they often involve a web of connect... Continue reading
26 Mar Compliance, Cybersecurity, IoT Security OWASP ISVS vs. CSA IoT Security Controls Framework – Which to Use When March 16, 2023 By Richard Barrus If you’re involved in information security, especially as a developer, you’ve likely come across the OWASP Foundation, a leading provid... Continue reading
25 Mar Compliance, Cybersecurity, IoT Security OWASP ISVS Levels Explained March 16, 2023 By Richard Barrus As a cybersecurity professional, you’ve probably heard of the nonprofit OWASP Foundation, a prominent authority on application security... Continue reading