↧
Adobe Supports OpenID RISC Integration with Google Social Authentication
Today is Safer Internet Day, and the slogan is, “together for a better Internet,” calling for stakeholders to join forces and help create a safer Internet. Thus, we wanted to share the details on our...
View ArticleDigital Forensics and Incident Response Using OSQuery
Understanding the anatomy of a potential incident can be one of the most challenging tasks that an incident response team faces, especially in the increasingly complex, cloud computing environments...
View ArticleUsing User Behavior Analytics to Detect Authentication Anomalies
You may think detecting user authentication anomalies is as simple as identifying a red egg in a carton of white ones, but it’s nowhere near that easy. On the other hand, it’s not impossible,...
View ArticleAutomating the Common Controls Framework
Over the past several years, the Adobe Technology Governance Risk and Compliance (GRC) team has developed and implemented the Common Controls Framework (CCF). The CCF helps various cloud products,...
View ArticleAutomating Secure Firewall Change Requests
As many companies transform to multi-cloud environments, managing firewall changes at the speed of development teams can be challenging. Teams across Adobe are constantly evolving cloud services to...
View ArticleIntroducing Tripod: an Open Source Machine Learning Tool
Machine learning (ML) and artificial intelligence (AI) are becoming very useful technologies in cybersecurity. However, before you can model, validate, and visualize security data that will actually be...
View ArticleRethinking Threat Intelligence with the LEAD Framework
Threat intelligence has been a key component of our detection process for many years. We created the LEAD threat intelligence framework to help security personnel make sense of the threat intelligence...
View ArticleMapping Your Way Through Application Security Obstacles
As a security researcher, it is always important to stay current and explore new technologies. Graph databases have been around for a while, but I never had a use case to dive into them until...
View ArticleUsing Machine Learning to More Quickly Evaluate the Threat Level of External...
Most antivirus (AV) software is designed for home/personal use. It can cover common scenarios. However, corporate networks must deal with preventing potential targeted attacks. These “attacks”? are...
View ArticleLeveraging Graphs to Improve Security Automation and Analysis
In my last blog, I gave the background for a research project where I am using graph databases to create graphs of application metadata to improve the efficiency of security automation. In this blog,...
View ArticleIntroducing Stringlifier – Adobe Security Team’s Latest Open Source Project
“1e32jnd9312”, “32189321-DEF3123-9898312”, “ADEFi382819312.” Do these strings seem familiar? They could be hashes, random generated passwords, API keys, or many other types of strings. You can usually...
View ArticleAutomating Enterprise SAML Security Tests – Part I
Single Sign-On (SSO) applications are becoming increasingly prevalent in organizations today. While there are many different SSO configuration types, Security Assertion Markup Language (SAML) is one...
View ArticleAutomating Enterprise SAML Security Tests – Part II
(This is part two of a two-part series offering guidance on how you can automate security tests for enterprise SAML infrastructure. In our first post we discussed the common vulnerabilities in...
View ArticleBetter Privileged Account Security Through Automation
One of the more common security issues organizations face today is helping ensure that users with elevated privileges rotate their passwords for various internal resources on a regular basis. To help...
View Article
More Pages to Explore .....