Whatever we’re doing for software security, it’s not enough. We need to keep vigilant … continue reading
Information Security Forum vice president Steve Durbin talks about cyber-resilience and collaboration … continue reading
Security is a top-down process; DevOps isn’t just driven by vendors … continue reading
Group issues paper listing 36 practices to reduce software security flaws … continue reading
Can computers be trained to verify a user’s identity by monitoring their behavior? They just might … continue reading
Apple was once seen as untouchable in the world of security. After the Flashback outbreak, that image is no more … continue reading
Companies do not keep good records of open-source use, nor do they check in enough with open-source communities … continue reading
Lack of management, governance of code use leaves organizations vulnerable to security breaches … continue reading
Hackers are one step ahead of security efforts, and are better organized than the businesses they target … continue reading
Personal devices on networks and Anonymous dominated discussion, while talk of locking down networks ceased … continue reading
Eric Darbe talks about the conflict between wide internal SharePoint adoption and security concerns … continue reading
SQL injections and cross-site scripting vulnerabilities remain despite years of drumbeating on the subject … continue reading