October 31, 2014KentonLeave a Comment on Securosis Blog | Building an Enterprise Application Security Program: Use Cases Securosis Blog | Building an Enterprise Application Security Program: Use Cases
July 2, 2014KentonLeave a Comment on The 5 Biggest Cybersecurity Myths, Debunked | WIRED The 5 Biggest Cybersecurity Myths, Debunked | WIRED
June 18, 2014KentonLeave a Comment on What are you doing? – DSEncrypt Malware | FireEye Blog What are you doing? – DSEncrypt Malware | FireEye Blog
April 23, 2014KentonLeave a Comment on Understanding Role Based Access Control: Advanced Concepts Understanding Role Based Access Control: Advanced Concepts
March 27, 2014KentonLeave a Comment on A Little Bird Told Me: Personal Information Sharing in Angry Birds and its Ad Libraries | FireEye Blog A Little Bird Told Me: Personal Information Sharing in Angry Birds and its Ad Libraries | FireEye Blog
February 19, 2014KentonLeave a Comment on Want to Know How a RAT Works? Want to Know How a RAT Works?
February 18, 2014KentonLeave a Comment on Friends Don’t Let Friends Mix XSS and CSRF – from The State of Security Friends Don’t Let Friends Mix XSS and CSRF – from The State of Security