Don’t overlook supply chain security in your 2023 security plan

Supply chain security concerns continue to grow. Does your company have a risk management strategy in place that addresses the possibility of a major supplier security failure? Image: Zapp2Photo/Shutterstock With…

Continue ReadingDon’t overlook supply chain security in your 2023 security plan

Tips and tricks for securing data when migrating to the cloud

Image: estherpoon/Adobe Stock More and more organizations are moving mission-critical systems and data to the cloud. While migration to and between all types of cloud services poses security challenges, migration…

Continue ReadingTips and tricks for securing data when migrating to the cloud

How to deploy a self-hosted instance of the Passbolt password manager

  • Post author:
  • Post category:Open Source
  • Post last modified:December 28, 2022

A password manager can keep your sensitive information in-house. Here's how to deploy Passbolt to your data center or cloud-hosted service.

The post How to deploy a self-hosted instance of the Passbolt password manager appeared first on TechRepublic.

Source of Article

Continue ReadingHow to deploy a self-hosted instance of the Passbolt password manager

What is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it?

  • Post author:
  • Post category:Open Source
  • Post last modified:December 21, 2022

Microsoft has open sourced its framework for managing open source in software development.

The post What is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it? appeared first on TechRepublic.

Source of Article

Continue ReadingWhat is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it?

What is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it?

  • Post author:
  • Post category:Open Source
  • Post last modified:December 21, 2022

Microsoft has open sourced its framework for managing open source in software development.

The post What is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it? appeared first on TechRepublic.

Source of Article

Continue ReadingWhat is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it?

Open source code for commercial software applications is ubiquitous, but so is the risk

As the SolarWinds and Log4j hacks show, vulnerabilities in open source software used in application development can open doors for attackers with vast consequences. A new study looks at the open source community’s efforts to “credit-rate” the risk.

The post Open source code for commercial software applications is ubiquitous, but so is the risk appeared first on TechRepublic.

Source of Article

Continue ReadingOpen source code for commercial software applications is ubiquitous, but so is the risk