© 2017 Ablative Security LLC

Follow Us

January 25, 2017

Many organizations are struggling to overcome key conceptual differences between today’s AI powered threat detection systems and legacy signature detection systems. A key friction area - in perception and delivery capability - lies with the inertia of Indicator of Comp...

January 24, 2017

In this part we’ll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from such an investment.

January 16, 2017

Much of the InfoSec would still struggles to understand the dynamics of 0-day vulnerabilities and the quandary of their widespread availability. There is a common misconception that the prolonged period between discovery and vendor patching is not only a security threa...

January 6, 2017

With near unanimous agreement between InfoSec authors of 2017 security predictions, ransomware will continue to grow as the number-one cyber threat that businesses will encounter and be forced to respond to this year. As predictions go, the Oracle of Delphi of legend w...

November 28, 2016

The demand for penetration testing and security assessment services worldwide has been growing year-on-year. Driven largely by Governance, Risk, and Compliance (GRC) concerns, plus an evolving pressure to be observed taking information security and customer privacy ser...