While companies are producing cleaner code overall, the average age of open source vulnerabilities is on the rise. Here are key metrics to mind.
Hackers have gotten more advanced, and so should data security approaches. Read about three new data security technologies that may soon be in use.
Beware: Playing fast and loose with your users’ privacy will catch up with you, sooner or later.
Don’t keep your data to yourself. Instead, learn to share with your industry peers—even competitors—for the greater good of the Internet.
You don’t need to be a government to take ROCA seriously. Make sure you’re not relying on a keygen that’s been broken since 2008.
It's not enough to start a program. You have to encourage, train, and mentor to create real security champions.
You won't learn much about the state of your application's security unless you're willing to trust an ethical hacker with your code.
How exposed are you to fake firmware? Is your hardware vendor taking this seriously? Are you?
Remote work and the threat landscape are juicing a number trends around cyber resilience. Here are four that SecOps team leaders should be tracking.
There's just too much happening for manual security processes to catch it all. Here are some suggestions for how to get started with automation.

Pages