Skip to content

AppSec Observer: Hacked (4)

The latest trends and tips in DevSecOps through instrumentation and security observability. Learn about real-world insight and “in-the-trenches” experiences on topics ranging from application and information security to DevOps and risk management.

Subscribe Now
Point of View: Senate Stalls Cybersecurity Bill

Point of View: Senate Stalls Cybersecurity Bill

The rush to "do something" about cyber security issues is leading both legislators in industry to ridiculous place...

Point of View: Chrysler recalls 1.4 million hackable cars

Point of View: Chrysler recalls 1.4 million hackable cars

“The interesting thing about this recall is not that it’s going to be expensive and inconvenient (it will), but that it..

Point of View: Tesla opens up bug bounty program

Point of View: Tesla opens up bug bounty program

“Bug bounty programs have been surprisingly effective and I don’t see this being any different for Tesla.  I..

Point of View: Army's Public Website Hacked by Unknown Intruders

Point of View: Army's Public Website Hacked by Unknown Intruders

All breaches are not created equal. The Army breach is actually considerably more disturbing than the IRS breach.  

Point of View: Federal Personnel Data Breach

Point of View: Federal Personnel Data Breach

Government agencies are in serious danger from cyber threats. While many have a continuous network security program in..

IRS Hackers stole $39M and effected 2.7 million taxpayers

It’s easy to jump all over the IRS for a seemingly obvious security problem. Congress and reporters are calling for a..

IRS hit by data breach exposing 100,000 records

Read what Jeff Williams has to say about the data breach the IRS experienced exposing over  100,000 records. What can..

We've Been Hacked. Our Data Was Breached. What Do I Do Now?

We've Been Hacked. Our Data Was Breached. What Do I Do Now?

We're Sorry You Got Hacked. First, if you just detected a data breach, you've been hacked, and you should probably stop..

The Ankle Biters of the Application Security World

The Ankle Biters of the Application Security World

The playing field isn't exactly level, and ankle biters (aka script kiddies and hackers) know it. While businesses and..