Quantcast
Channel: Ongoing Research – Security @ Adobe
Browsing latest articles
Browse All 24 View Live

Adobe Supports OpenID RISC Integration with Google Social Authentication

Today is Safer Internet Day, and the slogan is, “together for a better Internet,” calling for stakeholders to join forces and help create a safer Internet. Thus, we wanted to share the details on our...

View Article


Image may be NSFW.
Clik here to view.

Digital Forensics and Incident Response Using OSQuery

Understanding the anatomy of a potential incident can be one of the most challenging tasks that an incident response team faces, especially in the increasingly complex, cloud computing environments...

View Article

Image may be NSFW.
Clik here to view.

Using User Behavior Analytics to Detect Authentication Anomalies

You may think detecting user authentication anomalies is as simple as identifying a red egg in a carton of white ones, but it’s nowhere near that easy. On the other hand, it’s not impossible,...

View Article

Image may be NSFW.
Clik here to view.

Automating the Common Controls Framework

Over the past several years, the Adobe Technology Governance Risk and Compliance (GRC) team has developed and implemented the Common Controls Framework (CCF). The CCF helps various cloud products,...

View Article

Automating Secure Firewall Change Requests

As many companies transform to multi-cloud environments, managing firewall changes at the speed of development teams can be challenging. Teams across Adobe are constantly evolving cloud services to...

View Article


Image may be NSFW.
Clik here to view.

Introducing Tripod: an Open Source Machine Learning Tool

Machine learning (ML) and artificial intelligence (AI) are becoming very useful technologies in cybersecurity. However, before you can model, validate, and visualize security data that will actually be...

View Article

Image may be NSFW.
Clik here to view.

Rethinking Threat Intelligence with the LEAD Framework

Threat intelligence has been a key component of our detection process for many years. We created the LEAD threat intelligence framework to help security personnel make sense of the threat intelligence...

View Article

Image may be NSFW.
Clik here to view.

Mapping Your Way Through Application Security Obstacles

As a security researcher, it is always important to stay current and explore new technologies. Graph databases have been around for a while, but I never had a use case to dive into them until...

View Article


Image may be NSFW.
Clik here to view.

Using Machine Learning to More Quickly Evaluate the Threat Level of External...

Most antivirus (AV) software is designed for home/personal use. It can cover common scenarios. However, corporate networks must deal with preventing potential targeted attacks. These “attacks”? are...

View Article


Image may be NSFW.
Clik here to view.

Leveraging Graphs to Improve Security Automation and Analysis

In my last blog, I gave the background for a research project where I am using graph databases to create graphs of application metadata to improve the efficiency of security automation.  In this blog,...

View Article

Introducing Stringlifier – Adobe Security Team’s Latest Open Source Project

“1e32jnd9312”, “32189321-DEF3123-9898312”, “ADEFi382819312.” Do these strings seem familiar? They could be hashes, random generated passwords, API keys, or many other types of strings. You can usually...

View Article

Image may be NSFW.
Clik here to view.

Automating Enterprise SAML Security Tests – Part I

Single Sign-On (SSO) applications are becoming increasingly prevalent in organizations today. While there are many different SSO configuration types, Security Assertion Markup Language (SAML) is one...

View Article

Image may be NSFW.
Clik here to view.

Automating Enterprise SAML Security Tests – Part II

(This is part two of a two-part series offering guidance on how you can automate security tests for enterprise SAML infrastructure. In our first post we discussed the common vulnerabilities in...

View Article


Image may be NSFW.
Clik here to view.

Better Privileged Account Security Through Automation

One of the more common security issues organizations face today is helping ensure that users with elevated privileges rotate their passwords for various internal resources on a regular basis. To help...

View Article
Browsing latest articles
Browse All 24 View Live




<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>