It is largely recognised among the IT security community that there is a direct correlation between the quality of code – as a percentage of coding errors per thousand lines of code – and cyber ...
The shield of transparency has emerged as an invaluable asset in the world of cybersecurity, especially as digital connections and cyber threats continue to increase significantly. Organizations must ...
As artificial intelligence moves front and center, organizations are facing down a new context when they consider what the proper regime is, and how it should evolve. For Google LLC and Google Cloud, ...
As I discussed in my previous article, CISA’s secure-by-design principles—which apply to software vendors supplying the U.S. government but should be considered by all software designers—call for ...
As the threat landscape intensifies, organizations are poised to increase their investments in security solutions. Cybersecurity spending is on track to reach $215B by the end of this year, a 14% ...
It’s no surprise that demand for more secure software is rising and these two approaches claim to outline the best way forward. As cybersecurity professionals, we need to know that the software ...
The harbinger of things to come for software developers came earlier this spring when CISA Director Jen Easterly singled out the private sector during a speech at Carnegie Mellon University for the ...