Automating the Common Controls Framework

Using User Behavior Analytics to Detect Authentication Anomalies

Accessibility Joins the Adobe Common Controls Framework

incident response

Connect with us

Digital Forensics and Incident Response Using OSQuery

Click here to read this article.

Ongoing Research

Using Machine Learning to Detect Command Line Anomalies

Click here to read this article.

Ongoing Research

Adobe @ DefCon 2018

Click here to read this article.

Industry Events

ReproNow: Triage Assistant

Bug bounty programs (i.e.crowdsourced security) can bring a lot of benefits. Organizations are able to leverage talent from all over th...

OWASP, IR, ML, and Internal Bug Bounties

A few weeks ago, I traveled to the OWASP Summit located just outside of London. The OWASP Summit is not a conference. It is a remote of...

Adobe @ the Women in Cybersecurity Conference (WiCyS)

Click here to read this article.

Collaboration for Better Software Security

Click here to read this article.

Straight from the Source: SOURCE Boston

Click here to read this article.

Presenting “Malware Classifier” Tool

Click here to read this article.