Overcome the Security and Compliance Challenges in DevSecOps

Overcome the Security and Compliance Challenges in DevSecOps

Organizations are under tremendous pressure to deliver innovative products and stick to tight release timelines. To keep up with the rapid release schedule, engineering teams are adopting the DevOps model for its increased efficiency and agility. It has changed the way that development teams think. As a result, continuously improving performance and delivering releases faster have become standard. As software increases in complexity, security becomes even more important. The potential for vulnerabilities and threats goes…

Read More

Don’t forget to evaluate soft skills when hiring for cybersecurity positions

Don’t forget to evaluate soft skills when hiring for cybersecurity positions

Soft skills are just as important, if not more so, than technical skills in cybersecurity professionals. People with soft skills can be trained in tech skills, expert says. Image: fizkes / iStock There are many theories on how to eliminate the shortage of cybersecurity professionals. One expert suggested an outside-the-box approach in which HR departments and hiring managers consider candidates with nontraditional paths, but who have the appropriate soft skills. Soft skills are skills that…

Read More

Victim of Cyber-Theft Sues Parents of Alleged Culprits

Victim of Cyber-Theft Sues Parents of Alleged Culprits

A man from Colorado is suing the parents of two British youths who he claims stole Bitcoin worth nearly $800K from his digital wallet.  Cyber-thieves used malware to swipe 16.4 Bitcoin from Andrew Schober back in January 2018 when he was attempting to move his crypto-currency between virtual wallets.  To track his stolen funds, the aggrieved party hired private investigators, spending approximately $10,000 to discover who had swiped his crypto.   After investigators fingered two British lads who…

Read More

Identity is replacing the password: What software developers and IT pros need to know

Identity is replacing the password: What software developers and IT pros need to know

Identity and access management is pushing application security past single-factor authentication (a password) and even multi-factor authentication to a risk management model says Ping Identity CEO. Identity and access management systems are making it easier for software developers to secure their applications, for employees and customers to access the tools and services they need and for companies to protect their systems and data. On a recent episode of Dynamic Developer , I spoke with Andre…

Read More

Edge Apps in the enterprise – Cisco Blogs

Edge Apps in the enterprise – Cisco Blogs

The concept of edge computing has been in use for quite a while now in IoT networks. It makes immense sense for compute to be shifted to the edge in these kind of networks since we can save on costly bandwidth by avoiding unnecessary traffic over the WAN. Sensors that sent data up only when a metric changed Or just when thresholds were breached helped save on precious WAN bandwidth. More importantly this also dramatically…

Read More

Top 5 autonomous car roadblocks

Top 5 autonomous car roadblocks

Tom Merritt tells us the things that are getting in the way of autonomous car adoption. Someday we will live in a wonderland of cars that drive themselves. You’ll walk out the door, the car will arrive, open the door for you, you get in, and it whisks you everywhere you need to go. Today is not that day. Yet. But we’re getting closer. So what’s in the way? Here are five autonomous car roadblocks…

Read More

Back-to-Basics: Think Before You Click

Back-to-Basics: Think Before You Click

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More

Indonesians Told to Delete Unsecured Tracing App

Indonesians Told to Delete Unsecured Tracing App

The Indonesian government is exhorting the public to delete a COVID-19 test and trace app that left users’ personal information exposed on an unsecured server.   The data breach in the Indonesian government’s electronic Health Alert Card (eHAC) program was discovered by a research team at vpnMentor led by Noam Rotem and Ran Locar.  The program and the eHAC app were created in 2021 to monitor the coronavirus infection status of people entering the country. Obtaining an eHAC was mandatory…

Read More
1 3,565 3,566 3,567 3,568 3,569 3,996