
Finding Undisclosed Software Vulnerabilities: The Real Work Behind the Unknown
The search for undisclosed software bugs looks nothing like Hollywood’s rapid-fire typing and flashy terminals. It’s more like…

The search for undisclosed software bugs looks nothing like Hollywood’s rapid-fire typing and flashy terminals. It’s more like…

The Common Weakness Enumeration list helps coders catch problems they might not see coming. Think of it as…

You notice a lot about people when you’re up at 2 a.m. waiting for a vendor to reply…

You see an exploit kit in action, it’s almost mechanical, scanning for weak spots, picking at software flaws,…

Start with a living inventory, know exactly what’s running and where. Automate patching where possible, but never skip…

You can almost feel the unease when talking about zero-day attacks, they’re the kind of threat that hides…