Cloud security, hampered by proliferation of tools, has a “forest for trees” problem

Image: Ar_TH/Adobe Stock A new study Networks found that, on average, organizations rely on over 30 tools for overall security, and that degree of complexity is making for less security,…

Continue ReadingCloud security, hampered by proliferation of tools, has a “forest for trees” problem

GitHub rolling out two-factor authentication to millions of users

Over the next nine months, the largest internet hosting service for software development and collaboration will make all code contributors add another layer of electronic evidence to their accounts. Image:…

Continue ReadingGitHub rolling out two-factor authentication to millions of users

Following year-end ransomware storm, leaders batten hatches for sea of troubles in 2023

With the year ending with ransomware attacks, and 2023 beginning with a major data theft against T-Mobile, leaders are preparing for squalls ahead. Image: artboyshf142/Adobe Stock It was a mixed…

Continue ReadingFollowing year-end ransomware storm, leaders batten hatches for sea of troubles in 2023

Digital forensics and incident response: The most common DFIR incidents

Image: Gorodenkoff/Adobe Stock Digital forensics is growing while being more tied with incident response, according to the latest State of Enterprise Digital Forensics and Incident Response survey from Magnet Forensics.…

Continue ReadingDigital forensics and incident response: The most common DFIR incidents

Check Point’s annual cybersecurity event spotlights power of AI

The company showcased dozens of new security tools and services to detect and prevent malware, phishing, ransomware and other attacks, but AI took center stage. Image: your123/Adobe Stock Artificial intelligence…

Continue ReadingCheck Point’s annual cybersecurity event spotlights power of AI

SimSpace CEO brings dogfight mentality to terra firma for IT cybersecurity training

Image: Pixabay/Pexels As an F-15 fighter pilot in the U.S. Air Force, William “Hutch” Hutchison flew high-stakes, train-to-failure exercises in aerial jousting of the type popularized by movies like “Top…

Continue ReadingSimSpace CEO brings dogfight mentality to terra firma for IT cybersecurity training

Open source code for commercial software applications is ubiquitous, but so is the risk

As the SolarWinds and Log4j hacks show, vulnerabilities in open source software used in application development can open doors for attackers with vast consequences. A new study looks at the open source community’s efforts to “credit-rate” the risk.

The post Open source code for commercial software applications is ubiquitous, but so is the risk appeared first on TechRepublic.

Source of Article

Continue ReadingOpen source code for commercial software applications is ubiquitous, but so is the risk