Blog

­

Vulnerability Response and Disclosure: One Size Does Not Fit All

[Notice: This blog post should not be interpreted in any way as representing the position of any particular ICASI member company, or a formal position statement from ICASI itself.] A recent blog post brought back to the forefront debate around how and under what timeframes security vulnerabilities should be handled and disclosed. When dealing with [...]

Security Automation Webcast

In today's world of near-constant updates and patching, keeping a network up-to-date and secure is no easy task. After all, every time a vendor discloses a security vulnerability, network security administrators must identify affected devices and (in numerous cases) upgrade such devices. These activities can take hours, days, or even weeks depending on the size [...]

BlueHat: An ICASI member benefit

One notable perk of ICASI's non-profit forum of trust is that members often invite other members to their usually exclusive internal security conferences. Thanks to ICASI, it's not unusual to see, for instance, some Cisco employee attend Intel's annual security conference, or some Oracle folks attend Amazon's, etc. In fact, many ICASI participants say that these reciprocal internal [...]