Remove 2014 Remove Information Security Remove Open Source Remove Software
article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

Managing Director Security. Chief Information Security Officer. Department of Homeland Security. National Security Agency. Software Engineering Institute. National Security Correspondent. Deputy Chief Information Officer. Chief Information Security Officer. United Airlines.

article thumbnail

The Fuzzing Files: The Anatomy of a Heartbleed

ForAllSecure

In late March 2014, two teams of security researchers independently started fuzz testing OpenSSL, an open source utility that encrypts traffic from a web browser to a server and forms the basis of trusted transactions online. By providing invalid input continuously for several hours, flaws in the software can be revealed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Fuzzing Files: The Anatomy of a Heartbleed

ForAllSecure

In late March 2014, two teams of security researchers independently started fuzz testing OpenSSL, an open source utility that encrypts traffic from a web browser to a server and forms the basis of trusted transactions online. By providing invalid input continuously for several hours, flaws in the software can be revealed.

article thumbnail

The Fuzzing Files: The Anatomy of a Heartbleed

ForAllSecure

In late March 2014, two teams of security researchers independently started fuzz testing OpenSSL, an open source utility that encrypts traffic from a web browser to a server and forms the basis of trusted transactions online. By providing invalid input continuously for several hours, flaws in the software can be revealed.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

But how exactly will artificial intelligence help bridge the information security skills gap? And even with the help of machine learning algorithms, what kinds of security work is still best left to humans? Paul Roberts: This Security Ledgers Spotlight podcast is sponsored by ForAllSecure.

article thumbnail

The Cybersecurity Sprint: Are we safe yet?

Cloud Musings

One major and costly challenge will be in the area of software development. A recent analysis, State of Software Security by Veracode , that rated application security by using compliance with Open Web Application Security Project (OWASP) top 10 vulnerabilities recommendations as a yardstick found a “low pass rate” in government applications.

Dell 70
article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

But how exactly will artificial intelligence help bridge the information security skills gap? And even with the help of machine learning algorithms, what kinds of security work is still best left to humans? Paul Roberts: This Security Ledgers Spotlight podcast is sponsored by ForAllSecure.