Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SOLR vs. Elasticsearch: What's the best search engine for 2022?

While modern businesses depend on data to stay ahead of the competition, data alone isn’t enough. They also need efficient search engines to quickly index and search through millions of records to make sense of the data. Today we’re looking into SOLR and Elasticsearch, the two heavyweights in this domain, to compare their performance differences and use cases.

The 4-step plan to fortify your organization against cybersecurity threats

In today's technologically driven environment, security breaches are inevitable and cyber threats are plentiful. A fail-proof cybersecurity strategy has thus become the need of the hour. But how do you strategize a plan that accounts for this growing variety of threat actors? Join us for an insightful webinar where we'll build an effective cybersecurity strategy.

Fuzz Testing Automotive Software With Dependencies

The new ISO/SAE 21434 increases the requirement for security testing in the automotive domain. Car manufacturers must now provide advanced security tests for each software component, as part of the validation process. This includes either, penetration testing, vulnerability scanning and/or fuzz testing. But especially the early adoption of fuzz testing is currently becoming best practice among German car manufacturers.

Fuzzing Web Services | How to Automate Security Testing for Web Applications

Due to their high degree of interconnectivity, web applications are often difficult to secure. In this coding session, Simon Resch demonstrates an approach that allows you to simplify and automate your web application testing using modern fuzzing techniques. Content

How to Keep your Web Applications Secure: Everything you need to know about Fuzzing

In this coding session, Khaled Yakdan will demonstrate how to secure web applications with fuzzing, and explain how fuzz testing can help you to uncover complex security vulnerabilities, such as Denial of Services (DoS) and Uncaught Exceptions, in your source code. Content

Mocking Embedded Systems With Fuzz Data

In this live coding session, Daniel Teuchert shows you how to mock embedded systems with fuzz data. This approach enables you to use the advanced mutation methods of feedback-based fuzzing to simulate the behavior of external sources under realistic circumstances and cover unexpected and unlikely edge cases.

Fuzzing Embedded Systems With Dependencies (for Automotive)

In this recorded live hacking session, Daniel Teuchert, will demonstrate an automated testing approach, that will instantly improve your code coverage and also helps you to protect your automotive software against unexpected edge cases. See full description and use case: page.code-intelligence.com/fuzzing-with-dependencies/20210429

5 Tips to Stay Ahead of OpenSSL Vulnerabilities

Newer OpenSSL vulnerabilities are identified regularly by genuine security researchers or come to light as zero-day vulnerabilities when exploited by threat actors. While patching the bugs and OpenSSL vulnerabilities are important, organizations cannot wait for and rely just on patches to protect their websites. They need to be proactive in identifying and securing these vulnerabilities before attackers can find and exploit them.