Press Release: Anitian Completes SOC 2 Type I Certification for Security Operations Services
This rigorous audit validates Anitian as a trusted partner for cloud security operations Link to release Via PRWeb Link to PDF version of release...
The Security Dangers of “Lift and Shift” to the Cloud
Cloud and on-premise environments have different security models which can pose a danger when “lifting and shifting” applications
Different Missions, Different Methods: Why We Should Approach Corporate and Application Security Separately
There is an ongoing tension between corporate cybersecurity and application security. That tension is rooted in both the technical and...
Stuck In the Middle with You – 2019 State of DevOps Report
Puppet’s annual State of DevOps report details the challenges of integrating security and DevOps, and Anitian has some thoughts on this.
Appreciating Security One SQL Attack at a Time
Andrew Plato, CEO & Founder of Anitian, recently sat down with podcast host David “Ledge” Ledgerwood from Gun.io to discuss accidentally finding...
The Problem with Compliance
If compliance is not security, then why do it at all?
What is Compliance Automation?
The newest word on the market is Compliance Automation. But what exactly is Compliance Automation? Well, let’s start with what Compliance Automation is NOT.
The Next Shiny Object
“Four years!” As soon as the words left my mouth, I regretted saying them. Not because they were wrong, rather the incredulousness in my voice was...
Owning SAML
Exploiting a SAML Implementation During a recent web application test, I discovered a bug in a Security Assertion Markup Language (SAML)...
CyberSecurity 2028: By Default, By Design
In her keynote at the RSA Conference this year, futurist and game designer Jane McGonigal said: any useful statement about the future should at...
The NGFW is Dead
Let’s get this out of the way: the next-generation firewall (NGFW) is dead. The cause of death: cloud. However, this is not an execution, rather a...
A Study in Exploit Development – Part 2: Taking it to the Next Level
Welcome to Part 2 of this 2-part blog series looking at the details of exploring and validating an exploit! If you liked this series, I bet you'd be...
A Study in Exploit Development – Part 1: Setup and Proof of Concept
A Study in Exploit Development: Easychat SEH exploit A typical penetration test involves automated scanning to identify vulnerabilities, followed by...
The Top Five SOC 2 Compliance Questions Answered
SOC2 compliance is a must-have for SaaS companies. Anitian’s VisionPath compliance team looks at your road to SOC2 compliance.