How We Help
What We Do
Suits & Spooks
March 3, 2017
Yesterday the AWS team released a summary of why their S3 services in the Northern Virginia (US-EAST1) region were disrupted and some of the steps they’re taking to ensure it doesn’t happen again – in that service region or others.
For an outage that affected more than...
January 17, 2017
The AI revolution is still relatively young in the InfoSec world. Despite endless floors of vendor booths displaying the latest security device or technology, we're still in the v1.0 realm.
In many cases, while the marketing literature references machine learning, must...
AWS S3 Outage and Critical Infrastructure Attacks
Bug Bounty Programs: Are You Ready? - part 3
February 20, 2017
Characterizing the Friction and Incompatibility Between IoC and AI
January 25, 2017
Bug Bounty Programs: Are You Ready? - part 2
January 24, 2017
Bug Bounty Programs: Are You Ready? - Part 1
January 23, 2017
Security Automation Isn’t AI Security
A Pentester’s Cache of 0-days
January 16, 2017
From Anomaly, to Behavior, and on to Learning Systems
January 13, 2017
Suits & Spooks: Post DYN DDoS: Is government regulation of the IoT on the horizon?
January 10, 2017
Suits & Spooks: Shadowbrokers, Attribution, and Responsible Disclosure
January 9, 2017
What is a Pentest?
November 28, 2016
March 2017 (1)
February 2017 (1)
January 2017 (10)
November 2016 (3)