product development
Oracle patches exploited Agile PLM vulnerability (CVE-2024-21287)
Oracle has released a security patch for CVE-2024-21287, a remotely exploitable vulnerability in the Oracle Agile PLM Framework that is, according to Tenable researchers, …
The pitfalls of neglecting security ownership at the design stage
For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of inputs …
New quantum random number generator could revolutionize encryption
Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption developed at …
LibreOffice: Stability, security, and continued development
LibreOffice, the most widely used open-source office productivity suite, has plenty to recommend it: it’s feature-rich, user-friendly, well-documented, reliable, has an …
Organizations losing business due to connected product security concerns
59% of executives with cybersecurity decision-making responsibility at large and mid-sized companies say that their organizations have lost business due to product security …
Happy developers more likely to build secure apps
There’s an intrinsic link between developer happiness and application security hygiene, and an alarming level of application breaches, according to Sonatype. For the …
CISOs are skeptical about claims made by cybersecurity vendors
There is a high level of skepticism about claims due to vague product descriptions, ambiguous statistics, limited ability to measure product effectiveness, and a general lack …
Review: The Architecture of Privacy
About the authors Courtney Bowman has been working in the data analytics space for the last decade. He joined Palantir Technologies in 2010 as an in-house Privacy and Civil …
Featured news
Resources
Don't miss
- Preparing for Q-day: The essential role of cloud migration in securing enterprise data
- How the Shadowserver Foundation helps network defenders with free intelligence feeds
- Building trust in tokenized economies
- Solana’s popular web3.js library backdoored in supply chain compromise
- How widespread is mercenary spyware? More than you think