Where SBOMs Stand Today
June 2 2023It's been two years since Executive Order 14028. By using SBOMs as a standard, organizations can manage software risks, protect their reputation, and improve their cybersecurity posture.
Read moreIt's been two years since Executive Order 14028. By using SBOMs as a standard, organizations can manage software risks, protect their reputation, and improve their cybersecurity posture.
Read moreIn an already fraught environment surrounding the popular Python programming language software package manager, hackers are coming up with new ways to sneak malicious goodies past cybersecurity buffers.
Read moreLots to learn, clearly explained in plain English... listen now! (Full transcript inside.)
Read moreCode-signing certificates are supposed to help authenticate the identity of software publishers, and provide cryptographic assurance that a signed piece of software has not been altered or tampered with....
Read moreBugs in the biometric protections on Android phones and iPhones allow the limit on the number of tries to unlock the devices with a fingerprint can be bypassed, allowing...
Read moreRefreshed version of iconic SolarWinds logo and vibrant new brand color palette honor company’s historic success while highlighting future vision.
Read moreApple's growing market share — in a shrinking PC market — and the growing use of Golang for malware development is pushing a gradual increase in malicious tools targeting...
Read moreTen chief information security officers from a variety of verticals will provide valuable insights to Dark Reading on what they see as the industry's most pressing issues.
Read moreEarlier this week, I signed on to a short group statement, coordinated by the Center for AI Safety:
Mitigating the risk of extinction from AI should be a global...
Read more
Charlotte AI is the latest security-based generative AI assistant to hit the market.
Read more
Recent Comments