A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
The rate of change in the security landscape is so fast-paced and there are always new threats and new threats to keep on top of. The idea of being able to build that process regularly into the framework means you can keep on top of it. If your system can’t scale, you can’t grow and if it is vulnerable the damage is immeasurable.
In an era where cloud computing reigns supreme, the concept of security has undergone a profound transformation. As businesses rapidly migrate their operations and data to the cloud, the need to secure this digital frontier becomes increasingly paramount.
Uneven maintenance practices and developers' willingness to download risky code have made open-source repositories a favored initial access tactic for attackers.
The growing use of pre-existing software in cloud application development increases the risk of vulnerabilities that could impact the entire application.
Discovering a security flaw late in the development process is a waste of time, money, and effort. That’s why security checks during the continuous integration and continuous delivery/deployment (CI/CD) pipeline must be a CXO priority.
Deglobalization warrants a hard look by development organizations, particularly when it comes to questions like insider threats and supply chain risks.
How buyers can manage third-party risk when procuring applications, how to secure the software development process, the use of open source components (such as Log4j), or even how to affect cultural change among developers not used to thinking cyber first.
Whether it be for business or consumer use cases, app developers and cybersecurity professionals need to operate on synergistic levels to uphold the safest options for clients.
Adopt these best practices to move past a reactive approach to software development and build a productive work environment. Collaboration can turn security into a shared goal, not a bottleneck.
Building a DevSecOps initiative, no matter your budget, deployment environments or organization size, should be guided by a handful of principles. Here's what you need to know.
APIs are being deployed so fast and at such scale that companies risk both not knowing what they have (Shadow APIs), and losing control of API security, including exposing vital data and processes.
As software-related vulnerabilities continue to grow, companies must manage their software cyber risks to innovate faster and create safer, more secure digital products.
A recent analysis of breaches involving application programming interfaces (APIs) arrives at some eye-popping damage figures, but which companies are most affected, and in what ways?
To get content containing either thought or leadership enter:
To get content containing both thought and leadership enter:
To get content containing the expression thought leadership enter:
You can enter several keywords and you can refine them whenever you want. Our suggestion engine uses more signals but entering a few keywords here will rapidly give you great content to curate.