software

How Software Updates Can Lead to Cyber Attacks

In the world of cybersecurity, software updates are a double-edged sword. On one hand, they are crucial for patching vulnerabilities, enhancing features, and improving overall system performance. On the other hand, if not managed properly, software updates can inadvertently create opportunities for cyber attacks. Here’s how software updates can sometimes lead to security risks and […]

Software supply chain attacks are escalating at an alarming rate

[By Ross Bryant, Chief of Research at Phylum] If there is one safe prediction that I can make in 2024, it is that software supply chain attacks will continue to grow at an alarming rate. My team’s job is to track bad actors across the open-source software ecosystem, and there was a lot to see […]

China to discard 50 million computers because of software security concerns from US tech war

China has set a deadline to discard over 50 million computers operating in its government agencies because of software security concerns emerging from the US Tech war. As per the sources reporting to our cybersecurity insiders, Beijing has issued a public notice of all its governing bodies to upgrade their hardware and software within the […]

How to Use Your Asset Management Software to Reduce Cyber Risks

Source    Have you heard of the Colonial Pipeline incident?    The cyberattack on the company caused widespread panic throughout the United States and disrupted operations for days.    Yes, one lapse on a spam email, one inadequate password, one abandoned account, or a malfunctioning asset can cause havoc.   In fact, in the cybersecurity […]

Israel to keep a vigil on cyber software exports

All those governments and countries planning to buy any kind of software from Israel-based companies will have to sign an agreement from now on that they will not misuse the purchased software and will abide by the conditions laid in the agreement at the time of purchase. The Defense Ministry of Israel announced on Monday […]

A RECIPE FOR AVOIDING SOFTWARE FAILURES

This post was originally published by (ISC)² Management. Have you ever baked something, only to see it fail due to the lack of a key ingredient? For instance, a cake will not rise if you add baking powder after you realize it was forgotten in the original ingredient list. The same is true for many […]

CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL EXAM UPDATES

This post was originally published by (ISC)² Management. Last week, IBM’s Security Intelligence blog reported on the highly-discussed cybersecurity skills shortage – and in particular, how some areas are lacking in talent more than others. “Software development is one of the areas most starved of security attention,” wrote Irene Michlin. Read more here: https://blog.isc2.org/isc2_blog/2020/01/certified-secure-software-lifecycle-professional-exam-updates.html Photo:www.avinteractive.com

AI to help British police detect fake crimes

British Scientists is said to have devised an AI algorithm that can spot people who lie to police about being robbed for insurance claims. Scientists say that their newly discovered machine learning tool will have the ability to identify tele-tale signs in victim statements and will help curb fake reports. The Irish Police got an […]

Dell EMC release ‘Cyber Attack’ protection software for Data Centers

Dell EMC has announced new ‘Cyber Attack’ Protection software for data centers. And the solution is said to offer an automated means for isolating and recover critical data as soon as an attack incident impacts a server network. This includes protection from ransomware and other destructive cyber threats. Dubbed as ‘Cyber Recovery’ the new software […]

free software is like a free puppy…always

This post was originally published here by  Nat Kausik. Last year, Bitglass participated in the CASB bakeoff at an insurance company headquartered in the United States. Bitglass won the bakeoff.  But then…  One of the contestants in the bakeoff was a certain security company that was the incumbent vendor to the customer.   Having acquired multiple […]

Share this page