The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation
3 min read - In today's rapidly evolving security environment, it's imperative for organizations to establish a formal data risk management program that does more than just check the boxes.
Why the Best Defense Is a Good Offensive Security Strategy
2 min read - Offensive security activities like cyberattack simulations, penetration testing and vulnerability assessments can help companies identify and remediate flaws before cybercriminals can exploit them.
When Characters Turn Bad: String Sanitation Bypass via Best-Fit Mappings
3 min read - If you’re working on software that converts strings from one character set to another, such as when performing UNICODE to ANSI string conversions, you may have probably heard about best-fit mapping conversions.
Use-after-frees: That pointer may be pointing to something bad
6 min read - If you look at the last few Internet Explorer security bulletins, you'll notice that many of the patched vulnerabilities were use-after-frees (or UAFs) [1, 2]. Use-after-free is still a common bug class because the task of manually identifying them, especially...