Follow Us

March 3, 2017

Yesterday the AWS team released a summary of why their S3 services in the Northern Virginia (US-EAST1) region were disrupted and some of the steps they’re taking to ensure it doesn’t happen again – in that service region or others.

For an outage that affected more than...

February 20, 2017

The Bug Bounty movement grew out a desire to recognize independent security researcher efforts in finding and disclosing bugs to the vendor. Over time the movement split into those that demanded to be compensated for the bugs they found and third-party organizations th...

January 25, 2017

Many organizations are struggling to overcome key conceptual differences between today’s AI powered threat detection systems and legacy signature detection systems. A key friction area - in perception and delivery capability - lies with the inertia of Indicator of Comp...

January 24, 2017

In this part we’ll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from such an investment.

January 23, 2017

The premise of crowdsourcing the task of uncovering new bugs and vulnerabilities in an organizations web applications or consumer products sounds compelling to many. What’s not to like with the prospect of “many eyes” poking and prodding away at a corporate system for...

January 6, 2017

With near unanimous agreement between InfoSec authors of 2017 security predictions, ransomware will continue to grow as the number-one cyber threat that businesses will encounter and be forced to respond to this year. As predictions go, the Oracle of Delphi of legend w...

January 4, 2017

For many prospective buyers of the latest generation of network threat detection technologies it may appear ironic that these AI-driven learning systems require so much manual tuning and external monitoring by vendors during a technical “proof of concept” (PoC) evaluat...

November 15, 2016

When asked a poorly bounded question such as “What is the biggest threat to Internet security?”, the majority of quick-fire answers can likely be represented by the flags of a handful of nation states. Certainly the front-of-mind answer – identifying a cluster of hacke...

Please reload

  • Twitter Basic Square
  • RSS Social Icon
  • LinkedIn Social Icon
Please reload

Recent Posts
Search By Tags
Featured Posts

What is a Pentest?

November 28, 2016

1/1
Please reload

Archive
Please reload

Blog

© 2017 Ablative Security LLC