Cyber Security Chicago Blog

 
 

What is a Vulnerability Disclosure Policy and Why You Need One

Wednesday September 12 2018

Vulnerability disclosure policies (VDPs) are increasingly popular among many different types of industries. This blog explores why organizations of all shapes and sizes need an avenue to openly communicate with ethical hackers. To learn more about VDPs, visit HackerOne at Cyber Security Chicago, booth 300.

Read more



118 Fascinating Facts from HackerOne’s Hacker-Powered Security Report 2018

Wednesday September 12 2018

HackerOne recently published the Hacker-Powered Security Report 2018, the most comprehensive report on hacker-powered security. It is the largest repository of hacker activity and vulnerability data on display in a comprehensive report. We pulled the top 118 fascinating facts from the report. Visit us at booth 300, Cyber Security Chicago, to chat with our team and learn more.

Read more



The Voices of Vulnerability Disclosure: Look Who’s Talking About VDPs

Wednesday September 12 2018

Vulnerability disclosure policies (VDPs) are critical to reduce risk. The quotes below are compiled from industries in a variety of sectors on how important VDPs have been to help them reduce risk and control what used to be chaotic. To learn more about VDPs, visit HackerOne at Cyber Security Chicago, booth 300.

Read more



Are you prepared to defend your network?

Wednesday September 12 2018

Just as employees expect to work in a physically safe space, they also expect that their digital work is taking place on a secure network. They want to feel that their hard work crunching company data will be protected from hackers seeking to steal or manipulate the information, and they want to be able to trust that the files they receive from their coworkers are safe. IS professionals are the knights tasked with protecting their companies’ digital realms from invaders to ensure a safe working community.

Read more



Advanced threats call for advanced solutions

Tuesday September 11 2018

Just when cyber security professionals figure out how to combat and guard against one type of attack, another stronger malware attacks an unsuspecting — and unprepared — network. Newer, more evolved attacks are designed to skirt antivirus software and firewalls and access a targeted network. 

Read more



Three ways WAFs Fail

Tuesday September 11 2018

Ah, the WAF. You might know it by its street name: the web application firewall. It’s a long standing technology that has been handed down from generation to generation from datacenter to cloud to serverless. Rarely effective, largely disliked.

In the land of web application security, there are a few not-so-well-kept secrets, arguably none bigger than this:

The WAF survided not by being excellent, but by being mandated.

Read more



Top