Featured Posts

Anitian Makes it Easier to Find & Fix Vulnerabilities with New Dashboard

Anitian Makes it Easier to Find & Fix Vulnerabilities with New Dashboard

Today we’re excited to announce Anitian’s new interactive Vulnerability Management Dashboard which provides SecOps teams with a unified view of all vulnerabilities in their AWS and Microsoft Azure environments. By combining vulnerabilities from different scanners (OS,...

Anitian Named Finalist in Black Unicorn Awards for 2022

Anitian Named Finalist in Black Unicorn Awards for 2022

Company recognized as a finalist in the Baby Black Unicorn category, having potential of being valued at $1B in near future. PORTLAND, OREGON — October 27, 2022 — We are thrilled to announce that Anitian, the leading provider of cloud security and compliance...

Anitian Named a Sample Vendor in Three Gartner Hype Cycle Reports

Anitian Named a Sample Vendor in Three Gartner Hype Cycle Reports

Company included in Hype Cycle for Agile and DevOps, Hype Cycle for I&O Automation, and Hype Cycle for Cyber Risk Management.  Link to release via GlobeNewswire.com PORTLAND, Oregon — August 24, 2022 — Anitian, the leading cloud application security and compliance...

Debunking Quantum Cloud Myths

Debunking Quantum Cloud Myths

In many ways, the human appetite for computing power is ever-growing. More computing power can be found in the cloud for our ever-growing thirst for power. But that’s still not enough. Enter the next generation of computing power — quantum computing. In this episode...

All Posts

Is badBIOS for Real?

Is badBIOS for Real?

Is badBIOS a real threat? Maybe not, but the origin of this threat could be a very real problem ...
Read More
So, You Want Management to Listen to You

So, You Want Management to Listen to You

How do you get management to listen to security concerns? The answer is understanding why people listen to anything ...
Read More
Analysis of the New Requirements for PCI 3.0

Analysis of the New Requirements for PCI 3.0

Anitian analyzes the new requirements to the PCI DSS 3.0 ...
Read More
How to Get a Meaningful Security Assessment

How to Get a Meaningful Security Assessment

The curriculum of business schools are filled with case studies of companies that took short cuts to become competitive and accomplished ...
Read More
Windows GUI for nMap - WinMap

Windows GUI for nMap – WinMap

A powerful new GUI for Nmap – WinMap ...
Read More
How I Learned to Stop Worrying About Chinese Hacking and Love Cyberwar

How I Learned to Stop Worrying About Chinese Hacking and Love Cyberwar

What should we do about cyberwar and Chinese hacking? How about fix our pathetic defenses ...
Read More
The Needs of the Many: Becoming a Servant Security Leader

The Needs of the Many: Becoming a Servant Security Leader

“The needs of the many outweigh the needs of the few, or the one.”  This was Spock’s pragmatic wisdom from Star ...
Read More
owasp2013

OWASP Top Ten 2013 Updates

When an industry leader updates their flagship product, the technology community pays attention.  Any time Apple updates the iPhone, the tech ...
Read More
All Your SCADA Are Belong to Us

All Your SCADA Are Belong to Us

SCADA systems control many industrial facilities we all depend upon. These systems are vulnerable to attack. Fortunately, there are some tried ...
Read More
Java & Adobe - A Hacker's Best Friends

Java & Adobe – A Hacker’s Best Friends

Everybody needs friends. People you can depend on when times are rough. A buddy who will always come through and be ...
Read More
Intrusion Prevention Endgame

Intrusion Prevention Endgame

All good things must come to an end.  In the late 90’s I was fortunate to be involved with the development ...
Read More
UTM v NGFW: A Single Shade of Gray

UTM v NGFW: A Single Shade of Gray

What is the difference between Unified Threat Management (UTM) and Next Generation Firewalls (NGFW)? Anitian explored these two technologies and finds ...
Read More

Repost: Black Hat Hype Hurts the Risk Management Process

While Black Hat has been notably quieter and less frothy this year, this article (published in 2010) still rings true.  Hype ...
Read More
Packet Goes Where? The Value of Firewall Naming Conventions

Packet Goes Where? The Value of Firewall Naming Conventions

A zillion or so years ago, humans developed writing. This was a big deal for civilization. People could document things like ...
Read More
Cultural Zero-Day: How Poor Leadership Begets Security Weakness

Cultural Zero-Day: How Poor Leadership Begets Security Weakness

In the ten years Anitian has been working incident response and digital forensic cases, our analysts have observed many ingenious ways ...
Read More
PCI: I Find Your Lack of Scope Disturbing - Anitian

PCI: I Find Your Lack of Scope Disturbing

I find your lack of a scope of compliance disturbing ...
Read More

Slash your costs with Anitian

Gartner Hype Cycle - Anitian

FedRAMP guide