The path to reducing software vulnerabilities leads to AI

The path to reducing software vulnerabilities leads to AI

Tool proliferation has created a data volume challenge that is making it harder than ever to understand the security risks that really matter, which in turn makes it harder to secure the software development and deployment lifecycle. As threats continue to mount, this challenge will only get worse unless there is a better way of separating relevant risks from the background noise. Fortunately, AI now offers a solution Data, data, and more data Cybersecurity threats…

Read More

The journey toward secure software development lifecycles

The journey toward secure software development lifecycles

The digital transformation race is on, and companies are churning out applications at an ever-increasing pace. Unfortunately, this speed often comes at the cost of security. A recent study revealed a shocking statistic: 92% of companies experienced a breach due to vulnerabilities in their own internally developed applications. A different approach is clearly needed. The solution might be found in the security philosophy known as “shift-left,” which essentially promotes the integration of security practices earlier…

Read More

Fortifying the software supply chain: A crucial security practice

Fortifying the software supply chain: A crucial security practice

The software supply chain (SSC) serves as the backbone of software development, encompassing every stage from code creation to deployment infrastructure. However, the very interconnectedness that makes the SSC efficient also renders it vulnerable to escalating cyber threats. The urgency of software supply chain security Software supply chain security (SSCS) is paramount in safeguarding the integrity and security of software throughout its lifecycle. The gravity of reinforcing SSCS is underscored by the “State of Software…

Read More

Are AI data poisoning attacks the new software supply chain attack?

Are AI data poisoning attacks the new software supply chain attack?

With rapid AI adoption happening across varying business units, maintaining the integrity of those systems — and preventing AI data poisoning attacks — is a growing concern. But how do these attacks occur, and why should businesses be worried?  Much of it has to do with third-party access to business systems and data. In Venafi’s 2023 State of Cloud Native Security Report, 75% of security professionals stated their software supply chain presents their biggest security…

Read More

Better software supply chain security through SBOMs

Better software supply chain security through SBOMs

An executive order from President Biden in 2021 focused on enhancing software supply chain security. This added transparency can help to identify and mitigate security risks, such as vulnerabilities in open source components or malicious code that has been inserted into the supply chain. These Software Bills of Materials (SBOMs) play an important role in enhancing software supply chain security by providing transparency into the components used to build software. This requirement is designed to…

Read More

Importance of practicing red teaming at enterprises

Importance of practicing red teaming at enterprises

Importance of practicing red teaming at enterprises | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Preventing device failure: Building a foundation for success

Preventing device failure: Building a foundation for success

Preventing device failure: Building a foundation for success | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Shadow IT risk: A dangerous connection

Shadow IT risk: A dangerous connection

Shadow IT risk: A dangerous connection | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

The difference hardware encryption makes

The difference hardware encryption makes

The difference hardware encryption makes | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More
1 2 3 6