National Cybersecurity Awareness Month is observed every October as a way to raise awareness about the importance of cybersecurity, but despite the efforts to provide a safer and more secure Internet — problems still remain. In 1998, a group of computer hackers went in front of the Senate to warn them about cyber security. The … continue reading
New versions of open-source components are being released every day at an overwhelming and alarming pace. According to the open-source governance company Sonatype, approximately 20,000 component updates are made per day, making it near impossible for teams to manually manage dependencies. In addition, open-source projects that are impacted by attacks are difficult to detect because … continue reading
The costs of data breaches are continuing to rise. A new report has found the cost has risen 12 percent over the last five years and now costs $3.92 million on average per breach. Last year, the average cost was $3.86 million. According to the report, the formation of an incident response team, extensive use … continue reading
In recent weeks, data breaches seem to have suddenly become more widespread and far reaching across the globe. In Australia, the Office of the Australian Information Commissioner (OAIC) revealed more than 10 million individuals had their information compromised in a single incident. In Singapore, thousands of Red Cross blood donors had their personal information leaked. … continue reading
RSA Conference is taking place this week in San Francisco with a number of companies and thought leaders coming together to tackle the latest and greatest cybersecurity threats. “Some say it’s impossible to stay ahead of cybersecurity threats. We disagree. We’ll always be here as your go-to resource for exchanging ideas, learning the latest trends … continue reading
The Internet is one step closer to a passwordless future. The World Wide Web Consortium (W3C), along with the FIDO Alliance, announced that Web Authentication (WebAuthn) specification is now a web standard. WebAuthn is a core component of the FIDO Alliance’s FIDO 2 set of specifications, which aims to provide easier authentication services to mobile … continue reading
Microsoft wants to improve security teams’ ability to detect and respond to threats at scale. The company announced Microsoft Azure Sentinel and Microsoft Threat Experts to reduce noise, false alarms, and time-consuming tasks. “Cybersecurity is about people. The frontline defenders who stand between the promise of digital transformation and the daily reality of cyber-attacks need … continue reading
While artificial intelligence is changing our world for the better, if put in the wrong hands, cybercriminals can figure out how to use the technology in a negative way. To stay ahead of the curve, IBM Research has announced it has been studying the evolution of this technology in order to predict new potential threats … continue reading
Yale University is releasing a new report on the challenges and problem areas of cyber risk in today’s modern world. The report is based off of discussions from the second annual Yale Cyber Leadership Forum in April. The forum looked at the divide between the law, technology, and business communities as well as focused on … continue reading
Splice Machine has announced its data platform for intelligent apps is now available on Microsoft Azure. According to the company, this will give users an option to use the platform to deploy on premise, on AWS and now on Azure. The data platform is designed to help developers easily build and deploy predictive apps without … continue reading
The FIDO Alliance and the World Wide Web Consortium (W3C) have reached a major milestone in their effort towards bringing stronger and simpler web authentication to users globally. The organizations have announced the Web Authentication (WebAuthn) standard is advancing to the Candidate Recommendation stage, the last step before the final approval of a web standard. … continue reading
As the volume of security threats rises, so is the efficiency of Security Operational Centers (SOC) used to combat against security breaches. A newly released report from Micro Focus found a 12 percent improvement in SOC maturity, the biggest improvement over the last five years. The report is based on the company’s Security Operations Maturity … continue reading