Source: www.securityweek.com – Author: Kevin Townsend The Superior Court of New Jersey Appellate Division has ruled in favor of Merck in its $1.4 billion claim against...
Author:
Open Banking: A Perfect Storm for Security and Privacy? – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Open banking was born in the EU, flourished in the UK, and is now spreading around the globe – including...
Apiiro Launches Application Attack Surface Exploration Tool – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend RSAC 2023: Tel Aviv and New York based Apiiro announced an application attack surface exploration tool to sit on top...
Phylum Adds Open Policy Agent to Open Source Analysis Engine – Source: www.securityweek.com – Author: Kevin Townsend –
Source: www.securityweek.com – Author: Kevin Townsend. Category & Tags: Risk Management,Supply Chain Security – Risk Management,Supply Chain Security Software supply chain security firm Phylum has added...
Mandiant 2023 M-Trends Report Provides Factual Analysis of Emerging Threat Trends – Source: www.securityweek.com – Author: Kevin Townsend –
Source: www.securityweek.com – Author: Kevin Townsend. Category & Tags: Threat Intelligence,Report – Threat Intelligence,Report In a year dominated by kinetic/cyber war in Ukraine, North Korea doubles...
Cyberinsurance Backstop: Can the Industry Survive Without One? – Source: www.securityweek.com – Author: Kevin Townsend –
Source: www.securityweek.com – Author: Kevin Townsend. Category & Tags: Cyber Insurance,Government,Cyberinsurance,Featured – Cyber Insurance,Government,Cyberinsurance,Featured The cyberinsurance industry is lobbying for a government backstop. The government is...
The Security and Productivity Implications of Low Code/No Code Development – Source: www.securityweek.com – Author: Kevin Townsend –
Source: www.securityweek.com – Author: Kevin Townsend. Category & Tags: Vulnerabilities,Featured,Software,vulnerability – Vulnerabilities,Featured,Software,vulnerability The low code/no code movement provides simplified app generation – but it needs to...
CISA Introduces Secure-by-design and Secure-by-default Development Principles – Source: www.securityweek.com – Author: Kevin Townsend –
Source: www.securityweek.com – Author: Kevin Townsend. Category & Tags: Government,IoT Security,Supply Chain Security,Vulnerabilities,CISA,Featured – Government,IoT Security,Supply Chain Security,Vulnerabilities,CISA,Featured CISA has described and published a set of...