Used by millions of users worldwide, the Dolibarr ERP CRM has become a major integrated solution in the Open Source world. Its user and developer community is growing (source). Depended …

Read Story

GitGot is a semi-automated, feedback-driven tool that can rapidly search through troves of public data on GitHub for sensitive secrets. Read Jake Miller's other post explaining the conception of GitGot …

Read Story

What's Wrong With Scanners? Scanning tools are ubiquitous in the security industry. They can speed up manual workflows, provide security intelligence to supplement operations, and be integrated quickly in a …

Read Story

Introduction to Password Security While most organizations have a password policy that sounds technically secure, hardly any have a policy that benefits the organization, encourages strong passwords, and improves overall …

Read Story

RED TEAMING AS PART OF A HOLISTIC CYBERSECURITY PROGRAM In order to fully understand red teaming, it might be best to first decouple it from penetration testing. The two are …

Read Story

The Bishop Fox Cybersecurity Style Guide has been constantly evolving since its initial rollout in February 2018. It’s undergone one other iteration (v1.1, which you can find here) – until …

Read Story

A collaboration between Timehop and Bishop Fox. Download the PDF version here Fresh off the July 4th holiday, news broke that popular social media aggregator Timehop had been breached. Potentially …

Read Story

Avoid Common Mistakes When Deploying Cloudyy77-based Services Download the full PDF guide here The Threat of Poor AWS S3 Buckets Security If your organization uses Amazon Web Services (AWS), it …

Read Story

Recently, the Wi-Fi Alliance officially announced details for the WPA3 security standard, which includes a brand-new protocol: the “Enhanced Open” network. While this new technology will represent an improvement to …

Read Story

Subscribe by Email