-
Software supply chain attacks are rife – this is what developers need to watch out for | ITPro
Software supply chain attacks are rife – this is what developers need to watch out for | ITPro>IT Pro – Steve RangerNIST has issued new […]
-
Demand for ‘Secure by Design’ Product Growing, Creating Opportunity for Software Security Specia…
Demand for ‘Secure by Design’ Product Growing, Creating Opportunity for Software Security Specia…>Dark Reading – ISC2ISC2 has launched a new self-paced training for the Certified […]
-
New NIST Special Publication (SP 800-204D) Shines Light on Security of Cloud Software Supply Chains
New NIST Special Publication (SP 800-204D) Shines Light on Security of Cloud Software Supply Chains>Executive Gov – Jamie BennetNIST has issued a special publication (SP […]
-
10 Security Metrics Categories CISOs Should Present to the Board
10 Security Metrics Categories CISOs Should Present to the Board>Dark Reading – Ericka Chickowski**Cyber Reporting and Metrics: A Boardroom Priority** With increased regulatory requirements and […]
-
Navigating vulnerability markets and bug bounty programs: A public policy perspective
Navigating vulnerability markets and bug bounty programs: A public policy perspective>Internet Policy Review – Aviram ZrahiaEncouraging secure development and penetration testing has benefits like integrating […]
-
Confronting the alarming rise of supply chain attacks
Confronting the alarming rise of supply chain attacks>Innovation News Network – Supply chain attacks have been on the rise in recent years, with the SolarWinds […]
-
Ninety-One Percent of Organizations Report Software Supply Chain Incidents
Ninety-One Percent of Organizations Report Software Supply Chain Incidents>Security Magazine – A Data Theorem report found that 91% of organizations experienced a software supply chain […]
-
Gartner Predicts 30% of Enterprises Will Consider Identity Verification and Authentication Solut…
Gartner Predicts 30% of Enterprises Will Consider Identity Verification and Authentication Solut…Gartner – Gartner predicts that by 2026, the use of AI-generated deepfakes for attacks […]
-
Fragmented cybersecurity vendor landscape is exacerbating risks and compounding skills shortages…
Fragmented cybersecurity vendor landscape is exacerbating risks and compounding skills shortages…>IT Security Guru – Research from SenseOn finds highly contradictory cybersecurity attitudes amongst large UK […]
-
Cohesity Reveals over 9 in 10 UK Firms Have Paid Ransoms Despite Alleged “No Pay” Stances | The …
Cohesity Reveals over 9 in 10 UK Firms Have Paid Ransoms Despite Alleged “No Pay” Stances | The …>The Fintech Times – Research from Cohesity […]
Categories
- AI / ML
- AIOps
- IT/OT News
- Open Source
- Security Industry News
- Security Strategy News
- SOC News
- Zero Trust
Recent Posts
- Cybersecurity Threat Landscape and 2026 Outlook
- Cyber Resilience and Software Escrow
- AI & Humans: Making the Relationship Work – Schneier on Security
- How AI is Streamlining the Underwriting Process for the Insurance Industry