Manual testing plays a crucial role in ensuring the security of a system or application that handles sensitive assets. While vulnerability scans can provide valuable insights, they... More
Tag Archives: ISE
ISE: The Advantages of Manual Testing
M&E Journal: How to Build Security Into the Development Process
Most mornings, I have a smoothie for breakfast. It’s packed with wholesome stuff: organic spinach, bananas, pea protein, cashew butter, and plenty of good ol’ H2O. Once I�... More
A Hack the Box Walkthrough – Resolute (ISE Blog)
First, we’ll start with a TCP scan, and if no interesting services are found, we can switch to a UDP scan to uncover more potential attack surface. I use a standard nmap command ... More
How to Harden OpenVPN in 2020 (ISE Blog)
Since everyone is working from home for the foreseeable future, corporate IT departments are scrambling to bolster existing VPN solutions or deploy new ones as fast as possible. On... More
Security Guidance Fit for a Pandemic (ISE Blog)
As many of us transition to mandatory teleworking scenarios, thought pieces are popping up in every corner of the internet on how to best work from home. We wanted to take the oppo... More
M&E Journal: Break Your App. Do It Again
By Ted Harrington, Executive Partner, Independent Security Evaluators (ISE) - In karate, earning a black belt isn’t the end of your journey; it is just the beginning. So too i... More
ISE: IoT Manufacturers Missing Major Device Vulnerabilities
In just 13 Internet of Things (IoT) devices consulting and research firm Independent Security Evaluators (ISE) discovered 125 vulnerabilities, pointing to an industrywide problem w... More
ISE’s Harrington to Discuss ‘The Accidental Insider’ at July 25 M&E Day in NYC
Ted Harrington, executive partner with Independent Security Evaluators (ISE) will have a message for attendees of the Content Protection Summit July 25, during the Media & Entertai... More
ISE Research Spotlights Cryptocurrency Vulnerabilities, Theft (Technical.ly)
Baltimore-based Independent Security Evaluators has new research out that shows a vulnerability in the private keys used for transactions on the Ethereum blockchain platform, and t... More
3 Things You Need to Know about Securing a Blockchain (ISE Blog)
As leaders around the globe investigate how to leverage the benefits of blockchain technologies, security is often a primary concern. They may be aware of the many security benefit... More
M&E Journal: Securing Cloud Workflows: Why Misconfiguration and Improper Design Matter
By Ted Harrington, Executive Partner, Independent Security Evaluators - Content owners and their vendors face a burning problem: there is a compelling business case to migrate t... More
Smart Hollywood Summit: Don’t Neglect Blockchain Security
LOS ANGELES — Just by its definition, blockchain sure sounds synonymous with security: A decentralized database, comprised of a chain of records (or “blocks”), with each bloc... More
KlarisIP, Testronic, ISE to Share Perspectives at Feb. 27 Smart Hollywood Summit
Among the highlights of the Feb. 27 Smart Hollywood Summit — a day-long conference looking at the transformative effect AI, blockchain, metadata, OTT and automated processes are ... More
ISE: Leading Password Managers are Insecure (CBR)
Leading password managers are rife with insecurities when it comes to memory management, failing to scrub data from local memory that could be used to expose their bank of user pas... More
ISE’s Charitable Giving Campaign Has Information Security Hook
Security consulting firm Independent Security Evaluators (ISE) has launched new initiative, dubbed “Buy One / Give One,” that rewards companies that invest in a security assess... More
ISE, HGST Talk Storage Security at Content Protection Summit
Erik Weaver, global director of media and entertainment market development for Western Digital’s HGST, looks at the storage needs for the industry today, and sees some solutions ... More
Explaining the Internet of Things Cybersecurity Improvement Act of 2017 (ISE Blog)
Most of you have heard of the “Internet of Things”, the catchall phrase for common devices such as routers, cameras, printers, refrigerators, door locks, and so on that have be... More
PDF Watermarking: Dos and Donts (ISE)
PDF documents are used by nearly every company operating today. Most, if not all, of these companies will have employees with the need to share documents containing sensitive... More
M&E Journal: Secure Design Principles
By Ted Harrington, Executive Partner, Independent Security Evaluators (ISE) - First, it is important to define the primary secure design principles. Different academic, research... More