Vulnerability management today is a key process in any security program and regulatory compliance framework. With the growing amount of data breaches and...
“He shoots, he scores!” I still hear the sports announcer’s excitement coming across the loudspeaker -- in my high
I’m one of those managers who can’t sit in the office for more than a few days. I travel the world and constantly meet
As people, we make do with what we have, but once a better tool is within our reach we adopt it without looking back.
I build penetration testing software for a living. That means, businesses give our software a 007 license to hack and
In cyber warfare, like in chess, the game outcome is not determined by a single exploit (or move), but rather by a