False positives: Mitigating concerns from cybersecurity-minded users

False positives: Mitigating concerns from cybersecurity-minded users

Author’s note: Views are my own. Enterprise organizations may require that their product adhere to strict security requirements or undergo extensive vendor due diligence at onboarding. Technical analysis of the product, code or software via scanning or testing is often a step in this process. While a security assessment is a crucial component of any vendor management program, security assessments of a product can sometimes indicate risk when there is no risk. A typical example…

Read More

Cybersecurity and buying a car: More alike than you think

Cybersecurity and buying a car: More alike than you think

Cybersecurity and buying a car: More alike than you think | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Pharmaceutical company secures network with AppSec compliance tools

Pharmaceutical company secures network with AppSec compliance tools

<!– Pharmaceutical company secures network with AppSec compliance tools | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Implement NIST IoT cybersecurity guidelines early

Implement NIST IoT cybersecurity guidelines early

Implement NIST IoT cybersecurity guidelines early | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Minimum Viable Secure Product (MVSP): A vendor-neutral security baseline

Minimum Viable Secure Product (MVSP): A vendor-neutral security baseline

Minimum Viable Secure Product (MVSP): A vendor-neutral security baseline | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Cybersecurity solutions roundup 2021

Cybersecurity solutions roundup 2021

Cybersecurity solutions roundup 2021 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More