This week’s open-source project of the week is Token4Hope, a charity project powered by the DCore blockchain intended to draw transparency and security to charitable contributions. “When we realized that often charitable donations lack transparency and people would donate substantially more if they knew where exactly their funds go, we decided to propose our version … continue reading
Microsoft announced the August 2019 release of Visual Studio Code 1.38, adding updates as well as new features. Some of the key highlights include the ability to keep letter casing across multi-file search/replace; to check min, max, enum values and glob patterns; quick navigation features; and links to MDN documentation directly from IntelliSense. The full … continue reading
The rise in attacks against the software supply chain is one outgrowth of vulnerabilities in open-source code that go unnoticed and therefore unpatched, a problem that has escalated despite the best efforts of enterprise development teams. As many recent high-profile breaches have underscored, it takes little for an overlooked patch to wreak havoc. Even those … continue reading
The search for good cybersecurity talent is a struggle facing companies across the industry — a problem that is only likely to get worse over the next few years. According to a report from CNBC in March, there are nearly 3 million open positions globally for security professionals. The hiring shortage is expected to grow … continue reading
As computing moves from on-premises to the public cloud and the edge, protecting has data has become more complex, prompting Intel, Google, Microsoft, the Linux Foundation and other technology partners to launch a cross-industry effort for organizations to safely share data insights through the Confidential Computing Consortium. RELATED CONTENT: Microsoft tackles data sharing between organizations “The … continue reading
AWS announced the general availability of Amazon Forecast, which enables developers to build applications with the same machine learning technology used by Amazon.com for forecasting business conditions. According to the company, Amazon Forecast automatically discovers how variables such as product features, seasonality and store locations affect each other and can make predictions that are up … continue reading
The short answer is never. There, I just saved you enough time that you can go and do the right thing and run SAST and DAST and work on hardening your code, instead of trying to test security into your application. Look, every time a new technology, process, or technique comes along there are some … continue reading
Software security continues to be a top priority for organizations and development teams, but they are still struggling to address vulnerabilities in their applications. A recently released report revealed while organizations are beginning to increase their application testing efforts, their remediation rates are falling. The 2019 WhiteHat Application Security Statistics report is based on data … continue reading
Microsoft is boosting its efforts to make Azure more secure with the launch of Azure Security Lab, a set of dedicated cloud hosts for security researchers to test attacks against IaaS scenarios. In addition, the cloud giant is doubling the top bounty reward for Azure vulnerabilities to $40,000. “To make it easier for security researchers … continue reading
Microsoft announced the general availability for the Azure Security Center for IoT to protect the growing number of IoT deployments. According to IDC, IoT deployments will continue to grow at double digit rates until IoT surpasses $1 trillion in 2022. Azure Security Center provides threat intelligence, creates a list of potential threats and ranks them … continue reading
A crystal ball presentation on the future of application security at the Gartner Security and Risk Management Summit this year caught the eye of us in the software security space. In case you missed it, the top-line predictions were: By 2022, software composition analysis (SCA) will surpass traditional AST tools (SAST, DAST) as the primary … continue reading
Capital One is the latest company to suffer from a hack attack. A configuration vulnerability provided unauthorized access to a hacker who was able to obtain personal information of about 100 million U.S. individuals and 6 million Canadian individuals. RELATED CONTENT: The costs of data breaches are rising “We believe that a highly sophisticated individual … continue reading