Open Source Common Controls Framework (CCF) v3.0 Now Available

Introducing Tripod: an Open Source Machine Learning Tool

The Human Element and Security Awareness

Peleus Uhley

Connect with us

Mapping Your Networks with Marinus

Click here to read this article.

Open Source

New Flash Player Security Controls

Click here to read this article.

Product Alerts

OWASP, IR, ML, and Internal Bug Bounties

A few weeks ago, I traveled to the OWASP Summit located just outside of London. The OWASP Summit is not a conference. It is a remote offsite event for OWASP leaders and the community to brain storm on how to improve OWASP. 

Pwn2Own 2017

The ZDI Pwn2Own contest celebrated its tenth anniversary this year. Working for Adobe over the past ten years, I have seen a lot of changes in the contest as both an observer and as a vendor triaging the reports.

Security Automation Part III: The Adobe Security Automation Framework

In previous blogs [1],[2], we discussed alternatives for creating a large-scale automation framework if you don’t have the resources for a multi-month development project.

Security Automation Part II: Defining Requirements

Every security engineer wants to build the big security automation framework for the challenge of designing something with complexity. Building those big projects have their set of challenges.

Security Automation Part I: Defining Goals

This is the first of a multi-part series on security automation. This blog will focus on high-level design considerations. The next blog will focus on technical design considerations for building security automation.

Preparing for Content Security Policies

Click here to read this article.

A Vendor Perspective on Crowd Sourced Penetration Tests

Click here to read this article.

Reflections on Pwn2Own

Click here to read this article.

Community Collaboration Enhances Flash

Click here to read this article.

Better Security Through Automation

Click here to read this article.

Securely Deploying MongoDB 3.0

Click here to read this article.

Top 10 Web Hacking Techniques of 2014

Click here to read this article.