Phylum Releases a Free Community Edition to Make Software Supply Chain Security More Accessible
August 4 2022Users can identify risks across five domains, work on multiple projects, and take advantage of exclusive community benefits.
Read moreUsers can identify risks across five domains, work on multiple projects, and take advantage of exclusive community benefits.
Read moreIt's a myth that consuming and processing alerts qualifies as security. Today's technology allows better detection and prevention, rather than accepting the low bar for protection set by ingrained...
Read moreAgentless approach meets the attacker earlier to protect financial services and other large enterprises from an underserved attack vector.
Read moreIn the last month, "Pl0xP" cloned several GitHub repositories, adding malicious code to the forks that would attempt to infect developer systems and steal sensitive files that included software...
Read moreThe identity-services company is being acquired by Thoma Bravo software investment for cash, before being delisted.
Read moreSIKE is one of the new algorithms that NIST recently added to the post-quantum cryptography competition.
It was just broken, really badly.
We present an efficient key recovery...
Read more
Early-stage startup Footprint's goal is to provide tools that change how enterprises verify, authentication, authorize, and secure identity.
Read moreIf you spew projects laced with hidden malware into an open source repository, don't waste your time telling us "no harm done" afterwards.
Read moreCopado's Kyle Tobener will discuss a three-pronged plan at Black Hat USA for addressing human weaknesses in cybersecurity with this medical concept — from phishing to shadow IT.
Read moreCopado's Kyle Tobener will discuss a three-pronged plan at Black Hat USA for addressing human weaknesses in cybersecurity with this medical concept — from phishing to shadow IT.
Read more
Recent Comments