Please turn on your JavaScript for this page to function normally.
open source
Open source cyberattacks increasing by 650%, popular projects more vulnerable

Sonatype released a report that revealed continued strong growth in open source supply and demand dynamics. Further, with regard to open source security risks, the report …

IoT
IoT interest is growing, but so are cybersecurity concerns

Enterprises across the globe are showing renewed interest in the Internet of Things (IoT) and the Industrial Internet of Things (IIoT), and they are looking to service …

White House
The cybersecurity metrics required to make Biden’s Executive Order impactful

For too long, both the private and public sectors have not prioritized cybersecurity efforts enough and only acted in “good faith” – an inadequate effort to improve …

data
Demand for data is growing, but so are data supply chain challenges

Data suppliers are unable to efficiently deliver relevant data to a growing number of data consumers, according to a 451 Research survey. 55% of those surveyed report that …

shark
Cyber intrusion activity volume jumped 125% in H1 2021

The volume of cyber intrusion activity globally jumped 125% in the first half of 2021 compared with the same period last year, according to the Cyber Investigations, Forensics …

Tomislav Pericin
The destructive power of supply chain attacks and how to secure your code

In this Help Net Security podcast, Tomislav Peričin, Chief Software Architect at ReversingLabs, explains the latest and most destructive supply chain attacks, their techniques …

ENISA
Supply chain attacks expected to multiply by 4 in 2021

Supply chain attacks have been a concern for cybersecurity experts for many years because the chain reaction triggered by one attack on a single supplier can compromise a …

threat modeling
79% of organizations identify threat modeling as a top priority in 2021

Security Compass published the results of a report designed to provide a better understanding of the current state of threat modeling in mid-sized, $100M to $999M and large …

lock
How can a business ensure the security of their supply chain?

Since the SolarWinds’ supply chain attack, there has been an increased focus on how organizations of all sizes ensure the security of their suppliers. Large and small …

container
It takes less than one hour to exploit vulnerable container infrastructure

Aqua Security published a research revealing a continued rise in cyberattacks targeting container infrastructure and supply chains, and showing that it can now take less than …

Broken glass
Defense supply chain vulnerabilities creating security gaps

A BlueVoyant report highlights critical vulnerabilities within the defense supply chain ecosystem. The report includes evidence of the exploitable cyber weaknesses of SMBs …

open source
New Google tool reveals dependencies for open source projects

Google has been working on a new, experimental tool to help developers discover the dependencies of the open source packages/libraries they use and known security …

Don't miss

Cybersecurity news