A Jaw-Dropping Demo in Only 256 Bytes

“Revision” is probably the Olympics of the demoscene. The world’s best tiny graphics coders assemble, show off their works, and learn new tricks to pack as much awesome into as few bytes as possible or make unheard-of effects on limited hardware. And of course, there’s a competition. Winning this year’s …read more

Continue reading A Jaw-Dropping Demo in Only 256 Bytes

DevOps Chats: Open Source Security, With WhiteSource

WhiteSource, one of the leaders in the software composition analysis space, recently released its annual report, “The State of Open Source Security Vulnerabilities.” It is chock full of good data and findings on the current state of open s… Continue reading DevOps Chats: Open Source Security, With WhiteSource

Automate manual security, risk, and compliance processes in software development

The future of business relies on being digital – but all software deployed needs to be secure and protect privacy. Yet, responsible cybersecurity gets in the way of what any company really wants to do: innovate fast, stay ahead of the competition, and … Continue reading Automate manual security, risk, and compliance processes in software development

Bruce Schneier Proposes ‘Hacking Society’ for a Better Tomorrow

The security industry has the perfect skillset and adversarial defense outlook to deal with some of the emerging societal issues in today’s world, said security technologist Bruce Schneier. Continue reading Bruce Schneier Proposes ‘Hacking Society’ for a Better Tomorrow

All You’ve Ever Wanted to Know about Compilers

They say that in order to understand recursion, you must first understand recursion. Once you master that concept, you might decide that it’s time to write your own compiler that can compile itself as a fun side project. According to [Warren] aka [DoctorWkt], who documented every step of writing this …read more

Continue reading All You’ve Ever Wanted to Know about Compilers

Code dependency mapping’s role in securing enterprise software

Enterprise software is only as good as its security. Today, a data breach costs $3.92 million on average. Organizations are expected to spend $124 billion on security in 2019 and will probably invest even more given the alarming rate at which cyberatta… Continue reading Code dependency mapping’s role in securing enterprise software

Survey: Third-Party Code Proves Vulnerable

A recent survey of 307 IT professionals conducted Osterman Research on behalf of PerimeterX, a provider of cybersecurity tools for web applications, suggests there’s a lot of third-party code running on websites that no one can say with any certainty … Continue reading Survey: Third-Party Code Proves Vulnerable

Cybercriminals plan to make L7 routers serve card stealing code

One of the Magecart cybercriminal groups is testing a new method for grabbing users’ credit card info: malicious skimming code that can be loaded into files used by L7 routers. What is Magecart? Magecart is an umbrella label for a growing number … Continue reading Cybercriminals plan to make L7 routers serve card stealing code