The Latest in IT Security

1

Although third-party software libraries represent a majority of an application’s code, they account for less than seven percent of application vulnerabilities. Typically, applications contain both custom code – the code developed by an organization – and third-party libraries.

Read more ...

1

Whether they like it or not, in this day and age nearly all organizations have to think about their cybersecurity posture and find a way to minimize cybersecurity risk. But the main problem about doing the latter is that nobody can effectively assess the cybersecurity risk of organizations (or third parties, cyber insurance, or systems/devices/IoT and their transactions).

Read more ...

1

The first half of 2017 began with two intriguing ransomware events, both partly enabled by wormable exploit technology dumped by a group calling themselves “The ShadowBrokers”. These WannaCry and ExPetr ransomware events are the biggest in the sense that they spread the quickest and most effectively of known ransomware to date.

Read more ...

1

We often hear clients and prospective clients asking “how much should I be spending on cybersecurity?” That is a very complex question and one that is not easily answered without first having an understanding of what you mean by cybersecurity. There are many different versions of cybersecurity being pushed in the market and there is no “one size fits all” solution.

Read more ...

Categories

WEDNESDAY, JULY 26, 2017

Featured

Archives

Latest Comments

Social Networks