Blogs

RSA 2017 – A T-Shirt Response

“Have fun at RSA!” These are the words I hear from friends and family and colleagues at work that don’t have the opportunity to make the pilgrimage to San Francisco for the largest gathering of security folks of the year, the RSA Conference.  Regardless of whether you are a vendor, buyer, or general attendee, you […]

A Trumped-Up Approach to the Borderless War on “the Cyber”

Now that the inauguration and many of the Senate confirmation hearings are behind us, I’m starting to gather my thoughts as a security guy around cybersecurity policy in the new administration and where President Trump might take us all. Let me state up front that I’m not an apologist for the President, nor do I […]

HotSpot: Finding Vulnerabilities in Shared Internally-Developed Code

  We recently announced the release of ThreadFix 2.4 which includes our patent-pending HotSpot technology that identifies where internal teams are sharing code among themselves and where that code has vulnerabilities. Similar to what solutions like BlackDuck, Sonatype, and OWASP Dependency Check do for vulnerabilities in known open source components – but for code developed […]

Tis the Season for Security Predictions

Each year across the country, right after Thanksgiving, a curious thing occurs at many technology vendors. Marketing professionals reach out to their company thought leaders to let them know that it’s time to produce a prediction report. Shortly thereafter, collective eyes are rolling and groans accompany candid statements, such as “I have nothing new or […]

2016 Post Gartner Recap

                     Now that the dust has settled on the annual 2016 Gartner Security and Privacy Symposium, we can look back through a clean lens and identify themes that bubbled to the surface of the different sessions. Although a critical mass of security leaders were in attendance, […]

The Internet of Things (IoT) Changes Security

A few years ago, when you thought of all the devices connected on your home network, a desktop, a laptop and maybe an iPod or one of the first smartphones would be on the top of your list. Before advances in Wi-Fi, you could easily create a simple diagram of your home network and the […]