81% of codebases contain known open source vulnerabilities

Synopsys released a report which examines the results of more than 2,400 audits of commercial and proprietary codebases from merger and acquisition transactions, and highlights trends in open source usage within commercial and proprietary applications … Continue reading 81% of codebases contain known open source vulnerabilities

4 steps for building an orchestrated authorization policy for zero trust

There is a great deal of emphasis placed on the zero-trust approach with respect to access. Looking beyond authentication (the act of verifying that someone is who they say they are), evaluating authorization is just as important as it determines what … Continue reading 4 steps for building an orchestrated authorization policy for zero trust

The price of an accelerated digital transformation

F5 announced a report which shows the challenges organizations face as they transform IT infrastructures to deliver and secure digital services that have become inseparable from everyday activities, such as completing job tasks or consulting a doctor. … Continue reading The price of an accelerated digital transformation

Cybercriminals on Discord: Discovering developing threats

In this video for Help Net Security, Tal Samra, Cyber Threat Analyst at Cyberint, talks about Discord, a platform often used for cybercrime activities, and the possible threats users might come across. The application offers its users privacy and encry… Continue reading Cybercriminals on Discord: Discovering developing threats

Cloud native application security is a critical priority, risk perception is worryingly low

Aqua Security has announced the results of a study which reveals that UK organizations have a long road ahead when it comes to understanding, planning and deploying their cloud native security strategies. The survey gathered insights from 100+ cloud pr… Continue reading Cloud native application security is a critical priority, risk perception is worryingly low

How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?

Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that offer account creation. The findings show that 71 percent of companies surveyed… Continue reading How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?

The New-Phone Blues: A Reminder That Hackers Shouldn’t Settle

For all the convenience and indispensability of having access to the sum total of human knowledge in the palm of your hand, the actual process of acquiring and configuring a …read more Continue reading The New-Phone Blues: A Reminder That Hackers Shouldn’t Settle

Still too many parents don’t monitor their children’s online activity

Pixalate announced the results of a Harris Poll survey examining American parents’ views about about online privacy concerning their children. The survey found that 48% of parents of children under 13 say they monitor their children’s activ… Continue reading Still too many parents don’t monitor their children’s online activity