AEM Security Controls and Best Practices

Using Machine Learning to Detect Command Line Anomalies

Adobe @ Hack.lu 2018

DYK?

Connect with us

Using Machine Learning to Detect Command Line Anomalies

Click here to read this article.

Ongoing Research

MAVLink: Helping to Improve Our Cloud Services Hygiene

Click here to read this article.

Security Automation

Help Avoid DNS Takeovers

Click here to read this article.

Ongoing Research

Better Security Hygiene for Containers

Click here to read this article.

Security Automation

Wrangling Those Pesky 3rd-party Software Vulnerabilities

Like many large software companies, Adobe makes use of both open source and commercial off-the-shelf software components to deliver sol...
Security Automation

Adobe & Splunk CTF Competition

A hallmark of an engaged team is continuous learning and improvement. And this is no different for a SOC (Security Operations Center) t...

How Adobe Helps Protect You from Email Phishing

Email has always been a tool of choice cybercriminals.  By capitalizing on an established company’s brand reputation, they can send ...

The Impact of Public Policy on Cybersecurity

Public policy has been joined at the hip with cybersecurity in some shape, form or fashion for a while now. Whether it’s been efforts...

Introducing HubbleStack

Hello! My name is Colton Myers and I am the co-creator and architect of HubbleStack, an open-source security compliance project written...

ReproNow: Triage Assistant

Bug bounty programs (i.e.crowdsourced security) can bring a lot of benefits. Organizations are able to leverage talent from all over th...

Leveraging Security Headers for Better Web App Security

Modern browsers support quite a few HTTP headers that provide an additional layer in any defense-in-depth strategy. If present in an HT...

OWASP, IR, ML, and Internal Bug Bounties

A few weeks ago, I traveled to the OWASP Summit located just outside of London. The OWASP Summit is not a conference. It is a remote of...

Lessons Learned from Improving Transport Layer Security (TLS) at Adobe

Transport Layer Security (TLS) is the foundation of security on the internet. As our team evolved from primarily consultative role to s...

Getting Secrets Out of Source Code

Secrets are valuable information targeted by attackers to get access to your system and data. Secrets can be encryption keys, passwords...