By topic

DarkReading

Security Conferences Keep Us Honest Permalink

less than 1 minute read

Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...

AI Has Your Business Data Permalink

less than 1 minute read

No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.

Back to Top ↑

No Code

AI Has Your Business Data Permalink

less than 1 minute read

No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.

Back to Top ↑

Low Code

AI Has Your Business Data Permalink

less than 1 minute read

No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.

Back to Top ↑

Hacking

All You Need Is Guest

6 minute read

This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.

Security Conferences Keep Us Honest Permalink

less than 1 minute read

Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...

Back to Top ↑

Red Team

All You Need Is Guest

6 minute read

This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.

Back to Top ↑

Citizen Development

AI Has Your Business Data Permalink

less than 1 minute read

No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.

Back to Top ↑

Microsoft

All You Need Is Guest

6 minute read

This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.

Security Conferences Keep Us Honest Permalink

less than 1 minute read

Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...

AI Has Your Business Data Permalink

less than 1 minute read

No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.

Back to Top ↑

Vulnerability Management

Back to Top ↑

Application Security

Back to Top ↑

AI

AI Has Your Business Data Permalink

less than 1 minute read

No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.

Back to Top ↑

Vulnerability Disclosure

All You Need Is Guest

6 minute read

This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.

Security Conferences Keep Us Honest Permalink

less than 1 minute read

Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...

Back to Top ↑

Media

Security Conferences Keep Us Honest Permalink

less than 1 minute read

Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...

Back to Top ↑

Security Governance

AI Has Your Business Data Permalink

less than 1 minute read

No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.

Back to Top ↑

Cloud Security

Back to Top ↑

BlackHat

Security Conferences Keep Us Honest Permalink

less than 1 minute read

Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...

Back to Top ↑

IAM

Back to Top ↑

Zapier

Back to Top ↑

SDLC

Back to Top ↑

Threat Intel

Back to Top ↑

SaaS

Back to Top ↑

AAD / EntraID

Back to Top ↑

Risk Management

Back to Top ↑

Windows

Back to Top ↑

RPA

Back to Top ↑

Formal Verification

Back to Top ↑

Password Management

Back to Top ↑

TheRegister

Back to Top ↑

OWASP

Back to Top ↑

RSAC

Back to Top ↑