Uncategorized

Post: Embedding Security Practices into Digitization Drives

An increasingly competitive environment is forcing companies to innovate faster in order to provide more value to customers and other stakeholders and bring products and services to the market more quickly. They are called to do this by taking advantage of the opportunities afforded by a host of new digital technologies as part of their […]

Post: MIME Sniffing in Browsers and the Security Implications

Introduction Whenever a website in opened in a browser, there are many tasks that are being silently performed in the background. One of those tasks is fetching resources such as images, stylesheets and JavaScript from different domains on the internet and then parsing those resources. For example, a browser fetches an image from remote server […]

Post: Seeking Feedback: Validating Vendor Claims Involving AI in Security Products

RSA Peer-to-Peer (P2P) sessions are some of the hidden gems that too many RSA attendees overlook in the organized chaos that is the world’s largest annual security conference.  I’ve had the opportunity to facilitate several P2P sessions at recent RSA conferences including last year’s session titled “Practical Applications of AI in Security: Success Stories from the […]

Post: RSA 2018 Video: Scaling Security with ITProTV

Denim Group CTO Dan Cornell Speaks with ITProTV at RSA 2018

Post: Getting Started with IoT Security with Threat Modeling

Overview The Internet of Things (IoT) is an exciting and emerging area of technology allowing individuals and businesses to make radical changes to how they live their lives and conduct commerce. Millions of Internet-connected devices are being deployed to help individual users and enterprises make their lives easier and accomplish tasks quicker and easier than […]

Post: RSA 2017 – A T-Shirt Response

“Have fun at RSA!” These are the words I hear from friends and family and colleagues at work that don’t have the opportunity to make the pilgrimage to San Francisco for the largest gathering of security folks of the year, the RSA Conference.  Regardless of whether you are a vendor, buyer, or general attendee, you […]