Most third-party libraries are never updated after being included in a codebase

79% percent of the time, third-party libraries are never updated by developers after being included in a codebase – despite the fact that more than two thirds of fixes are minor and non-disruptive to the functionality of even the most complex sof… Continue reading Most third-party libraries are never updated after being included in a codebase

What is the impact of remote work on security best practices?

Employees are now accessing resources from any device and from anywhere outside of their corporate domain, a JumpCloud survey reveals. The report details the impact of COVID-19, IT’s chief concerns about new spending decisions, the impact remote work h… Continue reading What is the impact of remote work on security best practices?

Only 7% of security leaders are reporting to the CEO

While 60% of organizations have experienced a cyberattack in the last two years and spend approximately $38 million on security activities, only 7% of security leaders are reporting to the CEO, a LogRhythm report reveals. Yet, 42% of respondents say th… Continue reading Only 7% of security leaders are reporting to the CEO

It’s time for companies to take a hard look at how they manage secrets

Leaked infrastructure secrets – code, credentials and keys – which are exposed accidentally or intentionally cost companies an average of $1.2 million in revenue per year, according to a report from 1Password. The report explores how organi… Continue reading It’s time for companies to take a hard look at how they manage secrets

Defense supply chain vulnerabilities creating security gaps

A BlueVoyant report highlights critical vulnerabilities within the defense supply chain ecosystem. The report includes evidence of the exploitable cyber weaknesses of SMBs within the Defense Industrial Base (DIB) and demonstrates how cybercriminals are… Continue reading Defense supply chain vulnerabilities creating security gaps

Ransomware decreases as cybercriminals hit more lucrative targets

McAfee released a report examining cybercriminal activity related to malware and the evolution of cyber threats in the first quarter of 2021. The quarter saw cyber adversaries shift from low-return, mass-spread ransomware campaigns toward fewer, custom… Continue reading Ransomware decreases as cybercriminals hit more lucrative targets

76% of IT decision makers more vulnerable to mobile attacks than just a year ago

53 percent of IT decision makers admitted that it’s not possible to be prepared for all the tactics and strategies used by attackers targeting mobile devices, a survey by Sapio Research reveals. Going one step further, 38 percent claimed that it’s impo… Continue reading 76% of IT decision makers more vulnerable to mobile attacks than just a year ago

Most organizations would pay in the event of a ransomware attack

Despite the Director of the FBI, the US Attorney General and the White House warning firms against paying cyber-related ransoms, 60 percent of organizations have admitted they would shell out funds in the event of an attack, according to a research fro… Continue reading Most organizations would pay in the event of a ransomware attack

Software delivery maturity generating business benefits

Organizations with a high level of software delivery maturity are three times more likely to grow at 15 percent or more annually, according to Forrester Consulting. Conversely, those not modernizing their software delivery processes face increasing roa… Continue reading Software delivery maturity generating business benefits

Ask the Expert: What are ways we can balance / reduce the workload of the various audit and compliance exercises?

Michael DeLoach, Solution Consultant at Iceberg Networks and Mitch Blackburn, Global Head of Energy & Utilities Industry Solutions at ServiceNow discuss how organizations within the energy industry can balance the workload associated with audit and… Continue reading Ask the Expert: What are ways we can balance / reduce the workload of the various audit and compliance exercises?