Companies do not keep good records of open-source use, nor do they check in enough with open-source communities … continue reading
Lack of management, governance of code use leaves organizations vulnerable to security breaches … continue reading
Hackers are one step ahead of security efforts, and are better organized than the businesses they target … continue reading
Personal devices on networks and Anonymous dominated discussion, while talk of locking down networks ceased … continue reading
Eric Darbe talks about the conflict between wide internal SharePoint adoption and security concerns … continue reading
SQL injections and cross-site scripting vulnerabilities remain despite years of drumbeating on the subject … continue reading
Security can’t account for every last threat or vulnerability, but programmers should still strive for maximum protection … continue reading
Criminality, espionage, warfare and activism are the impetuses for today’s hackers … continue reading
The Metro interface will force at least some adaptation; meanwhile, what can we do to cut down on the same security holes? … continue reading
Frequently the biggest vulnerability of an application lies in the very code itself … continue reading
Common Weakness Enumeration version 2.0 highlights flaws in software development practices … continue reading
The third annual HP/Capgemini World Quality Report also points out increasing use of the cloud in developing economies … continue reading