Below you will find reports with the tag of “Buffer Overflow” The Economics of Penetration Testing for Web Application Security This white paper describes the critical role of pen testing for web applications. It explores the economics of “classic” pen testing and considers a variety of unseen costs and points of diminishing value. The paper concludes by describing a next-generation hybrid applicationsecurity-testing-as-a-service and how it can help bring the flexibility in applying both automated app testing tools (DAST) and the human expertise of ethical hackers (pen testing) to this challenge. (more available) Added: September 18, 2019 H1 2017 Cybersecurity Insights This report is focussed on providing insights based on events in 2017. Added: October 25, 2018 GTIC Monthly Threat Report July 2017 This monthly threat report takes a look at the month of July 2017. More specifically, it takes a look at why the GDPR matters, observations from the Cyber Kill Chain, and buffer flow VULNS. (more available) Added: October 18, 2018
The Economics of Penetration Testing for Web Application Security This white paper describes the critical role of pen testing for web applications. It explores the economics of “classic” pen testing and considers a variety of unseen costs and points of diminishing value. The paper concludes by describing a next-generation hybrid applicationsecurity-testing-as-a-service and how it can help bring the flexibility in applying both automated app testing tools (DAST) and the human expertise of ethical hackers (pen testing) to this challenge. (more available) Added: September 18, 2019
H1 2017 Cybersecurity Insights This report is focussed on providing insights based on events in 2017. Added: October 25, 2018
GTIC Monthly Threat Report July 2017 This monthly threat report takes a look at the month of July 2017. More specifically, it takes a look at why the GDPR matters, observations from the Cyber Kill Chain, and buffer flow VULNS. (more available) Added: October 18, 2018