The journey toward secure software development lifecycles

The journey toward secure software development lifecycles

The digital transformation race is on, and companies are churning out applications at an ever-increasing pace. Unfortunately, this speed often comes at the cost of security. A recent study revealed a shocking statistic: 92% of companies experienced a breach due to vulnerabilities in their own internally developed applications. A different approach is clearly needed. The solution might be found in the security philosophy known as “shift-left,” which essentially promotes the integration of security practices earlier…

Read More

CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code

CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code

More than half of open-source projects contain code written in a memory-unsafe language, a report from the U.S.’s Cybersecurity and Infrastructure Security Agency has found. Memory-unsafe means the code allows for operations that can corrupt memory, leading to vulnerabilities like buffer overflows, use-after-free and memory leaks. The report’s results, published jointly with the FBI, Australian Signals Directorate’s Australian Cyber Security Centre, and Canadian Cyber Security Center, are based on analysis of 172 critical projects defined…

Read More

Apple iOS 18 Cheat Sheet: Release Date, RCS Integration and More

Apple iOS 18 Cheat Sheet: Release Date, RCS Integration and More

Apple’s latest version of its mobile operating system, iOS 18, was unveiled during WWDC ‘24 on June 10, 2024, and features many niceties that users have been wanting for years. From AI integration with Siri and throughout the system to a standalone Passwords app, to being able to send messages via satellite when your iPhone doesn’t have service, there’s a feature that will likely appeal to someone. Whether you’re using an iPhone or an iPad,…

Read More

83% of organizations faced at least one account takeover the past year

83% of organizations faced at least one account takeover the past year

A survey from Abnormal Security reveals that account takeovers are a prominent threat. By surveying 300 security professionals across a range of industries and organization sizes, the report found that 83% of organizations claimed to have experienced at least one account takeover in the last year. Furthermore, 45.5% of organizations experienced more than five account takeover incidents in the past year, and nearly one in five experienced more than 10. The survey determined that 77%…

Read More

Lianne Potter | Women in Security 2023

Lianne Potter | Women in Security 2023

Lianne Potter | Women in Security 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Stay-at-home orders during the Covid-19 pandemic spurred new cloud computing and remote-technology setups, increasing company exposure to hackers. As a result, some corporate cybersecurity chiefs are also taking on the leadership role for all of information technology. Oversight of both groups isn’t an easy line to walk.  Having spent years in general IT, these chief information security officers understand the cyber risks of an increasingly far-flung tech infrastructure, said Lucia Milică Stacy, global resident CISO…

Read More

Cybersecurity Chiefs Navigate AI Risks and Potential Rewards

Cybersecurity Chiefs Navigate AI Risks and Potential Rewards

Security chiefs say the benefits of artificial intelligence are clear, but that the promises and risks of early generative AI are overblown. Generative AI platforms such as OpenAI’s ChatGPT have gained attention for their ability to answer conversational questions, write essays and perform other tasks in humanlike ways. Security vendors are touting the benefits of the technology, saying it can augment human analysts by analyzing and distilling data from wildly different sources into a digestible…

Read More

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Relentless cyberattacks and pressure to fix security gaps despite budget constraints are raising the stress levels of corporate cyber leaders and their worries about personal liability, a growing concern since the criminal case against Uber Technologies ’ former security chief. Hacks on companies’ IT systems often come with business disruptions, reputational damage, regulatory investigations and lawsuits. Chief information security officers must manage cybersecurity risks and, at the same time, educate C-suite colleagues and the board….

Read More

Secure code training ruled better investment than code scanning tools

Secure code training ruled better investment than code scanning tools

Secure code training ruled better investment than code scanning tools | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2 3 4