Email represents a large attack surface for any organization. From ransomware to phishing and credentials, cybercriminals have found new ways to use email to deliver malicious payloads and breach ...
It’s no surprise that demand for more secure software is rising and these two approaches claim to outline the best way forward. As cybersecurity professionals, we need to know that the software ...
The software security landscape is at an interesting juncture. As Jen Easterly, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), pointed out, there is a lesson to be ...
There are – and will always be – vulnerabilities in software. Just like there is no perfect security, there is no perfect codebase. That begs the question: What is the best way to fix software ...
For all the scary talk about cyberattacks from vendors and industry experts, relatively few attacks are actually devastating. But the Jaguar Land Rover (JLR) attack was. The JLR breach wasn’t some ...
What’s Next for Open Source Software Security in 2025? Your email has been sent Hidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe ...
As the primary (and sometimes sole) channel for corporate communications, email has been the natural area of focus for cybersecurity vendors looking to develop effective defensive solutions against ...
One of the most troubling problems in computer security at virtually every level is the chronic underfunding of the developers who work on it. This was driven home with particular vengeance in 2014 as ...
Today's business landscape is increasingly digital, shaped by changes in how documentation flows between colleagues and clients in remote and hybrid work environments. There’s no denying the benefits ...