Virtual patching is a way of implementing a security policy to eliminate or mitigate a vulnerability. It is not actually patching, but is a way to do something quick and external to the application. Why not just use a patch? Sometimes there is no patch available and other times speed is of the essence. And, […]
SQL Injection Attacks are a method for taking advantage of flaws in the way an application is written. In particular, they exploit application vulnerabilities that offer direct access to databases. Mike Shinn, CEO of Atomicorp, has employed SQL injections in cyber security Red Team exercises and built countermeasures that defend against them. In this week’s […]
This is my first shot at doing a basic before & after video mixed with an installation. I think my ambitions got ahead of me here since it ended up being 15 minutes long. Now I like a good video tutorial as much as the next turtle, but I think 15 minutes gets a little […]