Featured Posts

Anitian Recognized as a Vendor in Three Gartner Hype Cycle Reports

Anitian Recognized as a Vendor in Three Gartner Hype Cycle Reports

Company named in Hype Cycle for Agile and DevOps, Hype Cycle for I&O Automation, and Hype Cycle for Cyber and IT Risk Management. Link to release via PR Newswire PORTLAND, Oregon — July 28, 2021 — Anitian, the leading cloud application security and compliance...

Anitian Named a Vendor in Gartner Hype Cycle for Agile and DevOps

Anitian Named a Vendor in Gartner Hype Cycle for Agile and DevOps

Anitian cited as a Sample Vendor in the Continuous Compliance Automation (CCA) category, as DevOps and DevSecOps adoption grows. Link to release via PR Newswire PORTLAND, Oregon — July 20, 2021 — Anitian, the leading cloud application security and compliance...

Cloud Security Automation: The Fastest Path to Zero Trust

Cloud Security Automation: The Fastest Path to Zero Trust

I can still hear the dismissive calls of it being “just another security buzz word.” That was two years ago while advocating the importance of delivering Zero Trust Security tools in an explosive new area of enterprise security. At the time, my team and I were working...

All Posts

CyberSecurity 2028: By Default, By Design

CyberSecurity 2028: By Default, By Design

In her keynote at the RSA Conference this year, futurist and game designer Jane McGonigal said: any useful statement about the ...
Read More
The NGFW is Dead

The NGFW is Dead

Let’s get this out of the way: the next-generation firewall (NGFW) is dead. The cause of death: cloud. However, this is ...
Read More
A Study in Exploit Development - Part 2: Taking it to the Next Level

A Study in Exploit Development – Part 2: Taking it to the Next Level

Welcome to Part 2 of this 2-part blog series looking at the details of exploring and validating an exploit! If you ...
Read More
A Study in Exploit Development - Part 1: Setup and Proof of Concept

A Study in Exploit Development – Part 1: Setup and Proof of Concept

A Study in Exploit Development: Easychat SEH exploit A typical penetration test involves automated scanning to identify vulnerabilities, followed by a ...
Read More
The Top Five SOC 2 Compliance Questions Answered

The Top Five SOC 2 Compliance Questions Answered

SOC2 compliance is a must-have for SaaS companies. Anitian’s VisionPath compliance team looks at your road to SOC2 compliance ...
Read More
How to Make PCI Compliance a Little Easier for Everyone

How to Make PCI Compliance a Little Easier for Everyone

Is PCI compliance slowing you down? Read about our compliance services or reach out directly with any questions about your journey ...
Read More
The Human Firewall is a Lie

The Human Firewall is a Lie

It is delusional to think we can deprogram millennia of human evolution because information security is difficult. The human firewall is ...
Read More
What You Need to Know About Meltdown and Spectre

What You Need to Know About Meltdown and Spectre

What you need to know about Meltdown and Spectre vulnerabilities. It is not as bad as it seems ...
Read More
Ulterius Zero Day Disclosure

Ulterius Zero Day Disclosure

How Anitian discovered a zero day vulnerability in the Ulterius remote access software, and wrote an automated exploit tool ...
Read More
Ulterius Zero Day Disclosure

Ulterius Zero Day Disclosure

How Anitian discovered a zero day vulnerability in the Ulterius remote access software, and wrote an automated exploit tool ...
Read More
GDPR is Coming - Anitian

GDPR is Coming

GDPR has rapidly devolved into a touchstone for everything from vendor FUD to political frothing. It has been hailed as a huge ...
Read More
Webinar Video: GDPR is Coming - Anitian

Webinar Video: GDPR is Coming

The European Union’s General Data Protection Regulation (GDPR) wakes up and starts eating people on May 25th, 2018. You cannot stop ...
Read More
Webinar Video: PCI Compliance for AWS Cloud - Anitian

Webinar Video: PCI Compliance for AWS Cloud

Anitian wrote the book on PCI Compliance for AWS (along with the team at AWS). How do you make AWS environments ...
Read More
Webinar Video: Think Like a Hacker - Anitian

Webinar Video: Think Like a Hacker

When your job is to create and build a new product, intentionally breaking your creations seems wrong. Not to a hacker ...
Read More
Culture of Breach

Let’s Get Riggity Riggity Breached

Why do mega breaches happen? Fire up the portal gun Morty, we are going on adventure. Line up a thousand information ...
Read More
Equifax Breach - Outrage Fatigue

Equifax Breach – Outrage Fatigue

The Equifax breach has us all outraged…and we are not going to do anything to change that ...
Read More

Slash your costs with Anitian

Gartner Hype Cycle - Anitian

FedRAMP guide