OWASP Appsec Tel Aviv 2019, Tomer Zait's & Maxim Zavodchik's 'Webhooks Hookups Abusing API Developers' →
OWASP Appsec Tel Aviv 2019, Tin Zaw's 'Uninvited Guests: Understanding Malicious Web Bots With OWASP Handbook' →
OWASP Appsec Tel Aviv 2019, Krzysztof Kotowicz' & Mike Samuel's 'Trusted Types: End To End Injection Safety At Scale' →
working on the Information Security Engineering Team at Google Inc.
Mike Samuel is a Software Engineer,
working on the Technical Infrastructure Team at Google, Inc.
United States Army Cyber Command Announces Release of DOD Identity Awareness and Protection Management Guide
via the hardest working editor in the Information Security/Cyber Security/Physical Security space - William Knowles - the Senior Editor of Infosec News, comes an announcement report from the Department of the Army's U.S. Army Cyber Command in which, the publication of the DoD Identity Awareness and Protection Management Guide has been made generally available for public download.
"The IAPM Guide is divided into two-page chapters detailing key privacy considerations on the most popular online services, mobile apps, and consumer devices available in the market today. Each chapter provides you with tools, recommendations, and step-by-step guides to implement settings that maximize your security. The guide is updated twice a year, in March and September." - via William Knowles, Senior Editor of Infosec News and the U.S. Department of Defense's Department of the Army's, U.S. Army Cyber Command on the release of the IAPM Guide.
OWASP Appsec Tel Aviv 2019, Inon Shkedy's 'Testing And Hacking APIs' →
OWASP Appsec Tel Aviv 2019, Itsik Mantin's & Ori Or-Meir's 'How NLP Can Help Us Understand Web Attackers' →
OWASP Appsec Tel Aviv 2019, Geoffrey Hill's 'Bringing Rapid Prototyping To The Threat Model Process' →
OWASP Appsec Tel Aviv 2019, Aaron Guzman's 'Vehicle Security Trends & Implications For Automotive Suppliers' →
Aaron Guzman is a Director with Aon’s Cyber Solutions Group, also serving as Head of Automotive & IoT Testing.
Historical, Hidden Cellular Network Insecurity, The Litany Thereof
...and why, the history of security instability in cellular telephonic networks will emerge as one of the most important factors limiting wide-scaled implementation and deployment of 5G radiotelephony.
OWASP Appsec Tel Aviv 2019, Adi Belnikov's & Iris Levari's 'Testing Security In, The Right Way' →
Iris Levari is an Application Security Architect with two decades of experience in Cybersecurity; Adi Belinkov is the Vice President of Cybersecurity at JPMorgan Chase & Co, and is an Application Security Architect.
OWASP Appsec Tel Aviv 2019, Lukas Weichselbaum's 'Security For Modern Webapps: New Web Platform Security Features To Protect Your Application' →
Richard A. Clarke, Interviewed
FastCompany contributing editor Alex Pasternack has written-up a superb interview piece with the highly respected Richard A. Clarke, detailing his warnings of significant attack modalities that we all face as a nation, today, and the extreme danger unfolding around us. Today's Must Read!
"FC: The ransomware attacks seem like an interesting case study in how to respond, because some people are paying ransoms and some aren’t, and at great cost. RC: I think what’s interesting to me about ransomware is it’s picking off the low-hanging fruit. You know there’s that old joke that you don’t have to outrun the bear, you just have to, if there are three or four of you running, you just to run faster than the other guy. Well, that’s kind of the case with ransomware. Ransomware is picking off the slow runners. Ransomware is picking off the people who are spending 3 to 4% of their IT budget on security." - FastCompany contributing editor Alex Pasternack's superb interview of Richard A. Clarke