Security leaders should focus on risk management principles when tackling software supply chain security, according to the Center for Internet Security SVP and Chief Evangelist Tony Sager.
The Federal Emergency Management Agency (FEMA) 2022's Nonprofit Security Grant Program webinar will include an overview of resources available for security enhancements to nonprofit organizations at high risk of attacks.
How and when security measures are integrated into application development can greatly change the vulnerability level of software. Compare two cybersecurity strategies: DevSecOps and SecDevOps to see which makes more sense for your organization.
Foregrounding transparency can go a long way in securing your organization's technology and workforce, according to four cybersecurity experts from Intel. Suzy Greenberg, Vice President of Communications and Incident Response; Maggie Jauregui, Offensive Security Researcher; Katie Noble, Director of Intel's Product Security Incident Response Team (PSIRT) and Bug Bounty; and Amit Elazari, Director of Global Cybersecurity Policy discussed transparency in bug bounty and vulnerability disclosure programs, as well as gender parity in cybersecurity.
The Cybersecurity and Infrastructure Security Agency (CISA) has identified several potential risks of autonomous vehicles in transit systems and supply chains. Along with these risks, CISA has introduced a set of guidelines for organizations who use autonomous vehicles in their operations.
Oftentimes, security leaders and organizations need more clarification about the types of cybersecurity assessment services. Let's look at the goal of each service, its scope and the methodology used.
Vulcan Cyber released the results of its latest vulnerability remediation maturity research project. A survey of more than 100 enterprise security executives across North America and EMEA found that most enterprise cybersecurity and vulnerability management organizations lack the ability to drive remediation initiatives, to reduce risk and achieve acceptable levels of cyber hygiene.