Published inAdobe Tech BlogSecurity Blog Posts Are Moving to the New Adobe Security BlogBy the Adobe Security TeamJan 21Jan 21
Published inAdobe Tech BlogBehind the Scenes with Ammar Alim, DevSecOps LeaderBy Ammar Alim, Senior Manager, DevSecOpsDec 5, 2024Dec 5, 2024
Published inAdobe Tech BlogProofs of Concept: A Proactive Approach for Hypothesis-Driven Threat HuntingBy Adrian Bondocea, Senior Cyber Threat Hunter & Marius Manica, Manager, EMEA Computer Security Incident Response Team (CSIRT)Oct 23, 2024Oct 23, 2024
Published inAdobe Tech BlogAI-Powered Red Teaming: Keeping Pace with Our AdversariesBy Ty Anderson, Senior Red Team EngineerOct 15, 2024Oct 15, 2024
Published inAdobe Tech BlogScaling Your Threat Modeling Program using GenAIBy Linwood Jones, Senior Application Security Engineer and Pawan Suresh, Senior Application Security EngineerSep 23, 2024Sep 23, 2024
Published inAdobe Tech BlogAdobe Security Testing Reports: Expanding and Evolving Penetration Testing to Combat Adversarial…By Dana Pirvu, Manager, Penetration Testing, AdobeSep 3, 2024Sep 3, 2024
Published inAdobe Tech BlogStrengthening Corporate-wide Authentication at AdobeBy Chris Cayetano, Senior Manager of Enterprise SecurityAug 12, 2024Aug 12, 2024
Published inAdobe Tech BlogAdobe Transforms Public Vulnerability Disclosure Program into a Paid Bug Bounty ProgramBy Daniel Ventura, Manager of Product Security Incident Response Team (PSIRT)Jul 25, 2024Jul 25, 2024
Published inAdobe Tech BlogCybersecurity Red Teaming: When Assumptions Aren’t EnoughBy Justin Tiplitsky, Director of Red TeamJun 20, 2024Jun 20, 2024
Published inAdobe Tech BlogBehind the Scenes with Bridget: From Bowie State Intern to Full-Time EmployeeBy Bridget Oppong, Technology Compliance Product OwnerJun 19, 2024Jun 19, 2024