4 trends in software supply chain security

Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised. […]

The post 4 trends in software supply chain security appeared first on Security Intelligence.

Continue reading 4 trends in software supply chain security

4 trends in software supply chain security

Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised. […]

The post 4 trends in software supply chain security appeared first on Security Intelligence.

Continue reading 4 trends in software supply chain security

A CISA secure-by-design guru makes the case for the future of the initiative

The initiative had led to tangible changes, Jack Cable said upon his exit from the agency as senior technical adviser.

The post A CISA secure-by-design guru makes the case for the future of the initiative appeared first on CyberScoop.

Continue reading A CISA secure-by-design guru makes the case for the future of the initiative

Cybersecurity trends: IBM’s predictions for 2025

Cybersecurity concerns in 2024 can be summed up in two letters: AI (or five letters if you narrow it down to gen AI). Organizations are still in the early stages of understanding the risks and rewards of this technology. For all the good it can do to improve data protection, keep up with compliance regulations […]

The post Cybersecurity trends: IBM’s predictions for 2025 appeared first on Security Intelligence.

Continue reading Cybersecurity trends: IBM’s predictions for 2025

Playbook advises federal grant managers how to build cybersecurity into their programs

The guidance comes from the Office of the Director of National Cybersecurity and the Cybersecurity and Infrastructure Security Agency.

The post Playbook advises federal grant managers how to build cybersecurity into their programs appeared first on CyberScoop.

Continue reading Playbook advises federal grant managers how to build cybersecurity into their programs

Industry leaders on CISA’s secure-by-design pledge: A great program with some issues

House lawmakers and witnesses weighed in on secure-by-design incentives, subpar developers and the initiative’s future under new CISA leadership.

The post Industry leaders on CISA’s secure-by-design pledge: A great program with some issues appeared first on CyberScoop.

Continue reading Industry leaders on CISA’s secure-by-design pledge: A great program with some issues

Industry leaders on CISA’s secure-by-design pledge: A great program with some issues

House lawmakers and witnesses weighed in on secure-by-design incentives, subpar developers and the initiative’s future under new CISA leadership.

The post Industry leaders on CISA’s secure-by-design pledge: A great program with some issues appeared first on CyberScoop.

Continue reading Industry leaders on CISA’s secure-by-design pledge: A great program with some issues

CISA sees elimination of ‘bad practices’ as next secure-by-design step

Officials at the cyber agency are doubling down on shifting the security onus to software makers.

The post CISA sees elimination of ‘bad practices’ as next secure-by-design step appeared first on CyberScoop.

Continue reading CISA sees elimination of ‘bad practices’ as next secure-by-design step

Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds

Ex-National Cyber Director Inglis says “quantitative data” in Secure Code Warrior’s report shows the importance of the cybersecurity practice.

The post Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds appeared first on CyberScoop.

Continue reading Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds

Cybersecurity risks in healthcare are an ongoing crisis

While healthcare providers have been implementing technical, administrative and physical safeguards related to patient information, they have not been as diligent in securing their medical devices. These devices are critical to patient care and can leave hospitals at risk for cyberattacks, causing major disruptions to patient care. In fact, 88 million individuals have been affected […]

The post Cybersecurity risks in healthcare are an ongoing crisis appeared first on Security Intelligence.

Continue reading Cybersecurity risks in healthcare are an ongoing crisis