Remove Analysis Remove Case Study Remove Libraries Remove Security
article thumbnail

UNCOVERING VULNERABILITIES IN OPEN SOURCE LIBRARIES

ForAllSecure

In this post, we will follow up on a prior article on using Mayhem to analyze stb and MATIO by reviewing three additional vulnerabilities found in another open source library. This question is fairly self-explanatory, but sometimes a non-trivial hurdle: dynamic analysis needs to be able to run the target! What Makes a Good Target?

article thumbnail

Uncovering Vulnerabilities In Open Source Libraries (CVE-2019-13499)

ForAllSecure

In this post, we will follow up on a prior article on using Mayhem to analyze stb and MATIO by reviewing three additional vulnerabilities found in another open source library. This question is fairly self-explanatory, but sometimes a non-trivial hurdle: dynamic analysis needs to be able to run the target! What Makes a Good Target?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Uncovering Vulnerabilities In Open Source Libraries (CVE-2019-13499)

ForAllSecure

In this post, we will follow up on a prior article on using Mayhem to analyze stb and MATIO by reviewing three additional vulnerabilities found in another open source library. This question is fairly self-explanatory, but sometimes a non-trivial hurdle: dynamic analysis needs to be able to run the target! What Makes a Good Target?

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

Or even basic low level threat analysis. A lot of SMBs do not have security operations centers or SOCs. They have IT contractors who can provision laptops and maintain a certain level of compliance and security. They can provide that additional security, remotely. They have those security capabilities.

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

I’m just not convinced that a fingerprint or an image of my face is secure enough. In security we traditionally define the different factors of authentication as something you know, so that could be the username and password, or an answer to a security question. I'm a cyber security professional, I guess.

article thumbnail

Download IGI’s Whitepaper: Ameritas Leverages Technology For Improved Information Governance

IGI

The requirements of the regulation are far reaching and extend from information security and data governance, through access controls, identity management, systems and network monitoring, data privacy, environmental controls, risk assessment and incident response.