security

Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)

The guide’s example solutions demonstrate the effectiveness of the Internet Engineering Task Force’s Manufacturer Usage Description Specification in strengthening security for IoT devices on home and small-business networks.

Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD) Read More »

2018 State of Bug Bounty Report

The biggest difference between an unknown vulnerability and a known vulnerability, is the ability to take action on it.

Over the past year, there has been an increase of 21% in total vulnerabilities reported, and an increase of 36% in total bug bounty payouts.

Security leaders are beginning to realize that better awareness and information about disclosed vulnerabilities is critical to their operational success.

2018 State of Bug Bounty Report Read More »