For all the scary talk about cyberattacks from vendors and industry experts, relatively few attacks are actually devastating. But the Jaguar Land Rover (JLR) attack was. The JLR breach wasn’t some ...
The U.S. NSA, CISA and ODNI created the Securing the Software Supply Chain guide to focus on the software development lifecycle. Software supply chain attacks are on the rise, as cited in the Cloud ...
In the world of software development, the debate between open-source and proprietary software has been ongoing for years. While both have their merits, open-source software is increasingly being ...
In 1965, Ralph Nader’s groundbreaking book Unsafe at Any Speed exposed how car manufacturers prioritised style, performance, and profit over the safety of drivers and passengers. His narrative spurred ...
These CISA guides can help ensure cyber teams everywhere are buying software that is secure and follows development practices that don’t lead to future calamity. Your team is in charge of identifying ...
The software security landscape is at an interesting juncture. As Jen Easterly, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), pointed out, there is a lesson to be ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results