Featured Posts

Tips & Best Practices for Configuring Squid with NTLM Authentication

Tips & Best Practices for Configuring Squid with NTLM Authentication

If you’ve ever worked in environments requiring a proxy, reverse proxy, or caching system, you’ve likely heard of Squid proxy. Squid is one of the leading open-source proxy tools with an extensive community and available plugin library. As is the case with many large,...

Anitian Named Finalist in Black Unicorn Awards for 2022

Anitian Named Finalist in Black Unicorn Awards for 2022

Company recognized as a finalist in the Baby Black Unicorn category, having potential of being valued at $1B in near future. PORTLAND, OREGON — October 27, 2022 — We are thrilled to announce that Anitian, the leading provider of cloud security and compliance...

Anitian Named a Sample Vendor in Three Gartner Hype Cycle Reports

Anitian Named a Sample Vendor in Three Gartner Hype Cycle Reports

Company included in Hype Cycle for Agile and DevOps, Hype Cycle for I&O Automation, and Hype Cycle for Cyber Risk Management.  Link to release via GlobeNewswire.com PORTLAND, Oregon — August 24, 2022 — Anitian, the leading cloud application security and compliance...

Debunking Quantum Cloud Myths

Debunking Quantum Cloud Myths

In many ways, the human appetite for computing power is ever-growing. More computing power can be found in the cloud for our ever-growing thirst for power. But that’s still not enough. Enter the next generation of computing power — quantum computing. In this episode...

All Posts

Owning SAML

Owning SAML

Exploiting a SAML Implementation and SAML Vulnerability During a recent web application test, I discovered a bug in a Security Assertion ...
Read More
CyberSecurity 2028: By Default, By Design

CyberSecurity 2028: By Default, By Design

In her keynote at the RSA Conference this year, futurist and game designer Jane McGonigal said: any useful statement about the ...
Read More
The NGFW is Dead

The NGFW is Dead

Let’s get this out of the way: the next-generation firewall (NGFW) is dead. The cause of death: cloud. However, this is ...
Read More
A Study in Exploit Development - Part 2: Taking it to the Next Level

A Study in Exploit Development – Part 2: Taking it to the Next Level

Welcome to Part 2 of this 2-part blog series looking at the details of exploring and validating an exploit! If you ...
Read More
A Study in Exploit Development - Part 1: Setup and Proof of Concept

A Study in Exploit Development – Part 1: Setup and Proof of Concept

A Study in Exploit Development: Easychat SEH exploit A typical penetration test involves automated compliance scanning to identify vulnerabilities, followed by ...
Read More
The Top Five SOC 2 Compliance Questions Answered

The Top Five SOC 2 Compliance Questions Answered

SOC2 compliance is a must-have for SaaS companies. Anitian’s VisionPath compliance team looks at your road to SOC2 compliance ...
Read More
How to Make PCI Compliance a Little Easier for Everyone

How to Make PCI Compliance a Little Easier for Everyone

Is PCI compliance slowing you down? Read about our compliance services or reach out directly with any questions about your journey ...
Read More
The Human Firewall is a Lie

The Human Firewall is a Lie

It is delusional to think we can deprogram millennia of human evolution because information security is difficult. The human firewall is ...
Read More
What You Need to Know About Meltdown and Spectre

What You Need to Know About Meltdown and Spectre

What you need to know about Meltdown and Spectre vulnerabilities. It is not as bad as it seems ...
Read More
Ulterius Zero Day Disclosure

Ulterius Zero Day Disclosure

How Anitian discovered a zero day vulnerability in the Ulterius remote access software, and wrote an automated exploit tool ...
Read More
Ulterius Zero Day Disclosure

Ulterius Zero Day Disclosure

How Anitian discovered a zero day vulnerability in the Ulterius remote access software, and wrote an automated exploit tool ...
Read More
GDPR is Coming - Anitian

GDPR is Coming

GDPR has rapidly devolved into a touchstone for everything from vendor FUD to political frothing. It has been hailed as a huge ...
Read More
Webinar Video: GDPR is Coming - Anitian

Webinar Video: GDPR is Coming

The European Union’s General Data Protection Regulation (GDPR) wakes up and starts eating people on May 25th, 2018. You cannot stop ...
Read More
Webinar Video: PCI Compliance for AWS Cloud - Anitian

Webinar Video: PCI Compliance for AWS Cloud

Anitian wrote the book on PCI Compliance for AWS (along with the team at AWS). How do you make AWS environments ...
Read More
Webinar Video: Think Like a Hacker - Anitian

Webinar Video: Think Like a Hacker

When your job is to create and build a new product, intentionally breaking your creations seems wrong. Not to a hacker ...
Read More
Culture of Breach

Let’s Get Riggity Riggity Breached

Why do mega breaches happen? Fire up the portal gun Morty, we are going on adventure. Line up a thousand information ...
Read More

Slash your costs with Anitian

Gartner Hype Cycle - Anitian

FedRAMP guide