If We Really Cared About the Cybersecurity Talent Shortage… …We Wouldn’t Make Cybersecurity Jobs So Hard To Fill The cybersecurity industry is booming with job openings, but organizations don’t have the talent...
CodeHunter: Bridging The Cybersecurity Skills Gap Don’t Let Cybercriminals Take the Lead The cybersecurity skills gap is a threat to both personal privacy and national security. For the past decade,...
CodeHunter: Staying Ahead of Advanced Malware Picking Up Where Current Cybersecurity Solutions Leave Off Decades after the first computer worm made its way onto the internet, cyberattacks have...
It’s Time to Modernize Your Legacy Applications Save time and money — and keep your enterprise systems resilient — with automated testing. By: Team CodeHunter™ If you’re like many of the CTOs, CISOs, and business leaders we work with,...
Letter From CodeHunter's CEO, Larry Roshfeld: Why We Built CodeHunter The first malicious computer virus hit the PC world in the early ‘80s. The first commercial antivirus software for PCs launched a few years later — and the cybersecurity industry has...
CodeHunter CTO Chris O'Ferrell Featured in Forbes December 6, 2021 — CTO Chris O'Ferrell shares his predictions for cyberattacks in 2022 with Forbes magazine, alongside seven other cybersecurity experts: “Extremely advanced, AI-driven,...
How the U.S. Is Raising the Bar on Cybersecurity "You have the power, the capacity, and the responsibility to raise the bar on cybersecurity,” President Joe Biden told a room full of executives and cabinet members in August. With news of...
Why Executives Should Play Cyber War Games Make Sure You’re Prepared For Cyber Attacks Just as the military uses simulated environments to prepare troops, forward-thinking cybersecurity teams stage mock security breaches to...
CodeHunter Pro Version 1.5 — Enhanced Features Drive Even Better Results Check out the newest features and enhancements in Version 1.5 CodeHunter Pro Version 1.5 is now live. Here’s what’s new: Prioritized file processing. Parallel processing drives significant...
Why You Need To Reverse Engineer Malware — And Automate Your Analysis If You’re Not Automating, You’re Already Behind If you’re like many of the tech leaders we work with, you know you can’t build a strong cybersecurity framework without the capacity to quickly...
The Emergence of Killware The Next War May Be Started Remotely — With a Single Click Movies and television contribute to the popular image of hackers — solitary misfits disrupting business as usual from a poorly lit...
Insider Threats: The Danger Within Your Own Walls Reassessing Your Cybersecurity Framework From The Inside Out Remember the days when you could build a secure perimeter around your business and feel safe? With corporate boundaries...