Topic: security

A managed open-source approach can improve the health of your open-source supply chain

The rise in attacks against the software supply chain is one outgrowth of vulnerabilities in open-source code that go unnoticed and therefore unpatched, a problem that has escalated despite the best efforts of enterprise development teams. As many recent high-profile breaches have underscored, it takes little for an overlooked patch to wreak havoc.  Even those … continue reading

Companies are making up for lack of cybersecurity professionals by investing in their developers

The search for good cybersecurity talent is a struggle facing companies across the industry — a problem that is only likely to get worse over the next few years. According to a report from CNBC in March, there are nearly 3 million open positions globally for security professionals. The hiring shortage is expected to grow … continue reading

Industry leaders launch data security consortium

As computing moves from on-premises to the public cloud and the edge, protecting has data has become more complex, prompting Intel, Google, Microsoft, the Linux Foundation and other technology partners to launch a cross-industry effort for organizations to safely share data insights through the Confidential Computing Consortium.  RELATED CONTENT: Microsoft tackles data sharing between organizations “The … continue reading

SD Times news digest: Amazon Forecast now available, GitHub supports WebAuthn for security keys, and Qt for MCUs

AWS announced the general availability of Amazon Forecast, which enables developers to build applications with the same machine learning technology used by Amazon.com for forecasting business conditions.  According to the company, Amazon Forecast automatically discovers how variables such as product features, seasonality and store locations affect each other and can make predictions that are up … continue reading

When does SCA replace SAST or DAST?

The short answer is never. There, I just saved you enough time that you can go and do the right thing and run SAST and DAST and work on hardening your code, instead of trying to test security into your application. Look, every time a new technology, process, or technique comes along there are some … continue reading

Report: Organizations fail to remediate app security vulnerabilities

Software security continues to be a top priority for organizations and development teams, but they are still struggling to address vulnerabilities in their applications. A recently released report revealed while organizations are beginning to increase their application testing efforts, their remediation rates are falling.  The 2019 WhiteHat Application Security Statistics report is based on data … continue reading

Microsoft launches new security lab and raises top bounty for Azure vulnerabilities

Microsoft is boosting its efforts to make Azure more secure with the launch of Azure Security Lab, a set of dedicated cloud hosts for security researchers to test attacks against IaaS scenarios. In addition, the cloud giant is doubling the top bounty reward for Azure vulnerabilities to $40,000. “To make it easier for security researchers … continue reading

SD Times news digest: Azure Security Center for IoT, Armory announces funding for Spinnaker, and CodeStream approved for Slack

Microsoft announced the general availability for the Azure Security Center for IoT to protect the growing number of IoT deployments. According to IDC, IoT deployments will continue to grow at double digit rates until IoT surpasses $1 trillion in 2022. Azure Security Center provides threat intelligence, creates a list of potential threats and ranks them … continue reading

The future of application security

A crystal ball presentation on the future of application security at the Gartner Security and Risk Management Summit this year caught the eye of us in the software security space. In case you missed it, the top-line predictions were: By 2022, software composition analysis (SCA) will surpass traditional AST tools (SAST, DAST) as the primary … continue reading

Capital One data breach reaches 100 million users

Capital One is the latest company to suffer from a hack attack. A configuration vulnerability provided unauthorized access to a hacker who was able to obtain personal information of about 100 million U.S. individuals and 6 million Canadian individuals.  RELATED CONTENT: The costs of data breaches are rising “We believe that a highly sophisticated individual … continue reading

EFF has privacy concerns about Android Q

The upcoming version of the Android operating system is taking a strong focus on privacy, but the Electronic Frontier Foundation (EFF) believes it could still do better. Despite Android Q’s efforts to protect users, the EFF says the operating system still favors ad trackers over users.  Android Q’s new privacy features include: user control over … continue reading

Facebook fined $5 billion over privacy breaches

The importance of data privacy is starting to get more serious. The U.S. Federal Trade Commission today announced Facebook will be fined a record-breaking $5 billion penalty for violating its users privacy. This comes just days after the FTC and Equifax came to a $575 million agreement for its 2017 data breach.  RELATED CONTENT:  GDPR … continue reading

DMCA.com Protection Status