By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
Challenging ROI Myths Of Static Application Security Testing (SAST)
Mel Llaguno raises six challenges to Static Application Security Testing (SAST) analysis, raising questions on the efficacy of SAST for organizations focused on immediate benefits.
Learn about the quality assurance technique that uncovers coding errors and security loopholes during software vulnerability testing and assurance processes.
Why ForAllSecure Is A 2020 RSA Innovation Sandbox Finalist
Tamulyn Takakura, ForAllSecure's Head of Marketing, reflects on the company's journey from DARPA CGC winner, to MIT's 50 Smartest Companies, to RSA ISB top 10 finalist.
Fuzz testing is an effective technique for uncovering serious defects in software. From the Heartbleed vulnerability in 2014 to the infamous Jeep Cherokee hacking in 2015, fuzz testing is the technique that has made many high-profile discoveries possible. Consistently, fuzzing is proven to be a powerful tool for ensuring the ...
Uncovering Vulnerabilities In Cryptographic Libraries: Mayhem, MatrixSSL, And WolfSSL (CVE-2019-13470)
ForAllSecure Engineer, Tyler Nighswander, uncovers vulnerabilities in two popular cryptographic libraries, MatrixSSL and WolfSSL, utilizing Mayhem, a next-generation fuzzer.
Game Theory: Why System Security Is Like Poker, Not Chess
Cyber offense and defense isn’t chess. It’s a game of poker. In chess, you have complete visibility into your opponent’s position and moves. In poker, you lack that visibility, which also happens in the cyber realm.
Mayhem Moves To Production With The Department Of Defense
In 2016, Mayhem -- then still a research prototype -- showed that fully autonomous cybersecurity was possible. This was just the first step. Today, I’m thrilled to announce the next phase in the ForAllSecure journey.