Cyber Security and Your SaaS Ecosystem—Part 2

Cyber Security and Your SaaS Ecosystem—Part 2

Part 2: Deconstructing a Complex SaaS Marketplace    With more and more companies turning to SaaS Application Services to deliver critical business functions, it is paramount that cyber security teams, third-party and enterprise risk teams, legal teams, procurement, and business teams work together to define a shared understanding about how SaaS Application Services are vetted and qualified for[...]

Protecting Against Legacy Protocol Abuse

Protecting Against Legacy Protocol Abuse

The cyber security consequences of technical debt “Our job is to make everyone’s worst nightmare come true.” – Tim McGuffin, Lares Consulting Tim McGuffin and I go way back. Tim is the Senior Red Team manager with Lares Consulting. A self-described “hacker in the old school sense of the word,” Tim takes protocols and systems apart, figures out how they work, and then bends them to his will.[...]