Profile cover photo
Profile photo
Eoin Keary
161 followers -
OWASP Global Board Member
OWASP Global Board Member

161 followers
About
Posts

Post has attachment
Add a comment...

Post has attachment
10 Rules for Vulnerability Management
Rules for Vulnerability Management Below is a list of items and requirements based on client discussions in the case of delivering decent vulnerability management to clients both big and small.  From Visibility to API integration, from Validation to Develop...
Add a comment...

Post has attachment
Bugbounties and edgescan...complimentary approaches to robust continuous vulnerability management....
Add a comment...

Post has attachment
Coupling Breadth with Depth - Bugbounty and edgescan
Some edgescan clients, large and small use bug bounties
and our fullstack vulnerability SaaS service combined:  The big players in the bug bounty market are Bugcrowd and HackerOne and Synack and many larger enterprises run their own programs. Breath and Dep...
Add a comment...

Post has attachment
Add a comment...

Post has attachment
Client-Side Runtime Application Security Defence
At edgescan we have built a pretty good continuous fullstack vulnerability management platform and have a list of very interesting clients across many verticals such as media, gaming, medical sciences, finance, cloud etc. We do a good job of finding, valida...
Add a comment...

Post has attachment
RSA San Francisco 2018 - What to expect (from edgescan)
So here we are again, RSA 2018 in San Francisco, but to be honest its edgescans first time to attend as a vendor. The last time I was there was in 2014 teach 400 developers on secure application development with Jim manico . Funnily enough things have not c...
Add a comment...

Post has attachment
Visibility is Key when defending the enterprise - HIDE & Seek
Enterprise cyber security can be daunting with so many systems to consider both internally and public Internet facing. Something which on the surface seems simple is asset profiling and system visibility.  - Knowing what we have to secure is a good step in ...
Add a comment...

Post has attachment
Making a little sense of the edgescan 2018 vulnerability stats report...
Add a comment...

Post has attachment
2018 Vulnerability Stats Report - Simple things make the difference.
We finally finished off the 2018 edgescan Vulnerability Stats report this week. Overall things have not changed too much but we did a little more digging into the vulnerability data we harvested over the 12 months to December 2017. To that end we did some P...
Add a comment...
Wait while more posts are being loaded