The order calls for modernizing the cloud-security program and opens the door for other frameworks to be used for authorization. The Biden administration’s recently released cybersecurity-focused executive...
One high-profile expert raised the ever-looming workforce challenge in suggesting the juice might not yet be worth the squeeze. The National Telecommunications and Information Administration is...
Last week, Microsoft released the first stable version of its Windows 10 package manager, Winget, which enables users to manage apps via command-line. Much like package managers available on other platforms, Winget lets...
Offices of multiple Japanese agencies were breached via Fujitsu’s “ProjectWEB” information sharing tool. Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer...
The Government Accountability Office told lawmakers enforcement, through expanded reporting, of agencies’ supply chain security activity is “the thing that has to happen.” The National Institute...
The Treasury Department runs a program to insure the insurers, but there’s a limit to the backstop. The Government Accountability Office plans to review how well-suited...
The most popular open source repositories are rife with misconfigurations that leave countless downstream applications at risk from dependency confusion attacks, security researchers have discovered. Of the 1,000 organizations whose...
PHP is one of the most popular programming languages used worldwide. It powers around 80% of the web, including popular content management systems like Drupal and...
Move over CISOs, it may be time to make room for chief product security officers. Recent attacks highlighting the foundational role of software in critical services—a...
The nation-state attackers behind the SolarWinds supply chain attack could have gained access to the company nine months before it has been previously reported. This is according to...
Recent Comments