Cyber Security
INTERVIEW Securing web APIs requires a different approach to classic web application security, as standard tests routinely miss the most common vulnerabilities. This is the view...
Hi, what are you looking for?
INTERVIEW Securing web APIs requires a different approach to classic web application security, as standard tests routinely miss the most common vulnerabilities. This is the view...
The Open Source Security Foundation (OpenSSF) recently adopted Microsoft’s Secure Supply Chain Chain Consumption Framework (S2C2F) to help reduce vulnerabilities in open source software...
John Jackson has been working in cybersecurity for less than five years, but already has several significant wins under his belt. After five years as...
Addressing a decades-old deficiency in coding curriculums could have a profound effect on the security of the software supply chain, a leading expert on...
“Software can’t be the best without being secure.” This is according to Tanya Janca, who warns that businesses will “find themselves behind the security curve,...
From the infamous NotPetya campaign to the CCleaner backdoor, watershed infosec moments are not infrequent, but the SolarWinds supply chain attack stands out as particularly consequential. The so-called ‘Sunburst’...
INTERVIEW Aaron Portnoy confesses to periodic bouts of imposter syndrome, despite having carved out a distinguished career in offensive security. Among other things, Portnoy – now...
WordPress is the world’s most popular content management system, powering around 40% of all websites globally. While the open source technology has helped millions of business...
Recent Comments