Category Archives: Blog

Security in a liquid world

I am borrowing from Pat Gelsinger’s excellent opening keynote at VMworld 2014 that occurred on Monday. In his keynote, Pat referred to the concept of “Liquid IT”. Liquid …

August 27, 2014 //

Read more ›

Blackhat 2014 Review – Breaking the Security of Physical Devices

At Blackhat 2014 Dr. Silvio Cesare did an excellent job talking about the security of physical devices. His talk focused on systems that are deployed that rely on radio frequency …

August 27, 2014 //

Read more ›

PCI DSS 3.0 Doubles Down on Log Management

Sidenote: We’re hosting a PCI DSS Q&A webinar on September 24, 2014 and would love for you to join us. Registration is open now. Now … on to …

August 26, 2014 //

Read more ›

Exploit Monday – A few Interesting ones to be aware of

This weekly report is to discuss some of the more interesting vulnerabilities that have been found and to make sure that you patch appropriately. If there is not …

August 18, 2014 //

Read more ›

JournalCTL Terminal Escape Injection

JournalCTL Terminal Escape Injection && Log Injection A fun blast from the past By Tyler Borland (TurboBorland) Preface of Release Well, here’s a random bug I found a …

August 13, 2014 //

Read more ›