Ted HarringtoninIndependent Security EvaluatorsHackable: How to Do Application Security RightHackable is a book that rethinks penetration testing in order to help you build better, more secure products, and then prove itOct 14, 2020Oct 14, 2020
Ted HarringtoninIndependent Security Evaluators3 Things You Need to Know about Securing a BlockchainAttackers commonly attack the technology around a blockchain, rather than the blockchain itself.Apr 15, 2019Apr 15, 2019
Ted HarringtoninIndependent Security EvaluatorsBehavioral eManipulationAttacking The Care Delivery Workflow to Deliver HarmApr 21, 2018Apr 21, 2018
Ted HarringtoninIndependent Security EvaluatorsA Method to the Madness: How to Think About Security & Privacy for IoTAs we enter a new year — a year in which IoT is expected to continue it explosive adoption trend — it is important to continue to be…Feb 9, 2018Feb 9, 2018
Ted HarringtoninIndependent Security EvaluatorsHow to Build Systems That Are Resilient Against AttackIt is almost a daily occurrence in today’s society to read a news story about a major company or government entity becoming the next victim…Apr 5, 2017Apr 5, 2017
Ted HarringtoninIndependent Security EvaluatorsConnected Medical Device Security: The Usefulness of Unenforceable GuidanceCompliance has proven time and time again to be an ineffective approach to security.Mar 6, 2017Mar 6, 2017