Home
|
Published Work
|
Books
🎧 To The Point podcast: With Software, Hope is a Strategy? With Jonathan Knudsen (Part 2)
🎧 To The Point podcast: With Software, Hope is a Strategy? With Jonathan Knudsen (Part 1)
📺 CyRC Developer Series OWASP Top 10
CyRC special report: Secure apps? Don’t bet on it
CyRC Special Report: How companies fared in the aftermath of Log4Shell
CyRC Case Study: Securing BIND 9
CyRC Vulnerability Analysis: CVE-2022-1271 in gzip, but it’s not as bad as it sounds
CyRC Vulnerability Analysis: Two distinct Spring vulnerabilities discovered – Spring4Shell and CVE-2022-22963
How to cybersecurity: Software supply chain security is much bigger than you think
How to cybersecurity: Gravity is a harsh mistress
How to cyber security: Software supply chain risk management
A stitch in BIND saves nine
How to cybersecurity: Heartbleed deep dive
How to cyber security: Butter knives and light sabers
How to cyber security: Invisible application security
How to cyber security: Addressing security fatigue
How to cyber security: Embedding security into every phase of the SDLC
CyRC Vulnerability Advisory: Denial of service vulnerabilities in RabbitMQ, EMQ X, and VerneMQ
How to cyber security: Leverage AST solution data to make risk-based decisions
How to cyber security: 5G is not magic
How to cyber security: Minimize risk and testing time with Intelligent Orchestration
How to cyber security: Containerizing fuzzing targets
How to cyber security: Faceplanting in 10 lines of code
How to cyber security: Software security is everyone's responsibility
Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol
Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network
How to cyber security: Gotta go fast...but why?
New survey shows integrating application security testing gaining traction in DevOps
How To Cyber Security: Put the Sec in DevOps with Intelligent Orchestration
How to cyber security: Pain in the *AST
How to Cyber Security: Fuzz a tank
Find more bugs by detecting failure better: An introduction to SanitizerProcessMonitorAgent
How to Cyber Security: Software testing is cool
How to Cyber Security: Fuzzing does not mean random
How to Cyber Security: Application security is critical for data security
Tips for working from home without losing your marbles or compromising security
How to Cyber Security: Software is manufacturing
How to Cyber Security: It's all about developers, except when it's not
How to Cyber Security: A journey of a thousand miles
How to Cyber Security: Software is critical infrastructure
How to Cyber Security: Unicorns and donkeys