INTERVIEW Securing web APIs requires a different approach to classic web application security, as standard tests routinely miss the most common vulnerabilities. This is the view of API...
The Open Source Security Foundation (OpenSSF) recently adopted Microsoft’s Secure Supply Chain Chain Consumption Framework (S2C2F) to help reduce vulnerabilities in open source software – a...
John Jackson has been working in cybersecurity for less than five years, but already has several significant wins under his belt. After five years as an engineer...
Addressing a decades-old deficiency in coding curriculums could have a profound effect on the security of the software supply chain, a leading expert on the subject...
“Software can’t be the best without being secure.” This is according to Tanya Janca, who warns that businesses will “find themselves behind the security curve, so to...
From the infamous NotPetya campaign to the CCleaner backdoor, watershed infosec moments are not infrequent, but the SolarWinds supply chain attack stands out as particularly consequential. The so-called ‘Sunburst’ attack, which...
INTERVIEW The security of the software supply chain has rocketed up the infosec agenda since The Daily Swig last spoke to Brian Fox, co-founder and CTO at DevSecOps vendor...
The Federal Bureau of Investigation (FBI) warns of increasing complaints that cybercriminals are using Americans’ stolen Personally Identifiable Information (PII) and deepfakes to apply for remote...
The average female cybersecurity professional exits the industry aged just 30. This is according to a leading figure of global non-profit Women in CyberSecurity (WiCyS), which...
When a business goes offline, its customers are inconvenienced and its operators lose money. The outage might also be evidence of a cyber-attack. Monitoring web services and...
Recent Comments