Follow Us

January 25, 2017

Many organizations are struggling to overcome key conceptual differences between today’s AI powered threat detection systems and legacy signature detection systems. A key friction area - in perception and delivery capability - lies with the inertia of Indicator of Comp...

January 24, 2017

In this part we’ll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from such an investment.

January 23, 2017

The premise of crowdsourcing the task of uncovering new bugs and vulnerabilities in an organizations web applications or consumer products sounds compelling to many. What’s not to like with the prospect of “many eyes” poking and prodding away at a corporate system for...

January 17, 2017

The AI revolution is still relatively young in the InfoSec world. Despite endless floors of vendor booths displaying the latest security device or technology, we're still in the v1.0 realm.

In many cases, while the marketing literature references machine learning, must...

January 16, 2017

Much of the InfoSec would still struggles to understand the dynamics of 0-day vulnerabilities and the quandary of their widespread availability. There is a common misconception that the prolonged period between discovery and vendor patching is not only a security threa...

January 13, 2017

Anomaly detection approaches to threat detection have traditionally struggled to make good on the efficacy claims of vendors once deployed in real environments. Rarely have the vendors lied about their products capability – rather, the examples and stats they provide a...

January 10, 2017

It’s a bit hard to miss all the stories and concerns over IoT security. In some ways it’s reminiscent of the late 1990’s and the endless stream of security failures related to Windows 95, ME, and XP – which ultimately lead to Bill Gates famous companywide memo of 2002...

January 9, 2017

Threat actor attribution in the cyber world – when done properly – is a damned difficult task complicated by missing and inaccessible traffic logs, international jurisdictions, and routing through anonymizing proxies and compromised hosts scattered around the globe. Un...

January 6, 2017

With near unanimous agreement between InfoSec authors of 2017 security predictions, ransomware will continue to grow as the number-one cyber threat that businesses will encounter and be forced to respond to this year. As predictions go, the Oracle of Delphi of legend w...

January 4, 2017

For many prospective buyers of the latest generation of network threat detection technologies it may appear ironic that these AI-driven learning systems require so much manual tuning and external monitoring by vendors during a technical “proof of concept” (PoC) evaluat...

Please reload

  • Twitter Basic Square
  • RSS Social Icon
  • LinkedIn Social Icon
Please reload

Recent Posts
Search By Tags
Featured Posts

What is a Pentest?

November 28, 2016

1/1
Please reload

Archive
Please reload

Blog

© 2017 Ablative Security LLC