Boffins at the University of Glasgow, in Scotland, have developed a system which
they claim demonstrates a new type of cybersecurity threat: a "thermal attack.
Find the latest security analysis and insight from top IT security experts and leaders, made exclusively for security professionals and CISOs.
The K12 Security Information eXchange (K12 SIX) released “Cybersecurity Frameworks: What K-12 Leaders Need to Know,” a new resource for state and local education leaders encouraging the adoption of nationally recognized cybersecurity best practices. This white paper was commissioned by the State Educational Technology Directors Association (SETDA) as part of the work of its Cybersecurity & Privacy Collaborative.
Forget hackers and trojans - the most dangerous threat to your data is your most valuable resource: your employees. Employee data theft is among the top reasons for breaches and data loss, with tremendous negative consequences for the affected companies.
Best Practices for Protecting Your Data
When Employees Leave Your Company
When employees leave a company, whether voluntarily or involuntarily, it is quite
common for them to take sensitive and confidential data with them.
What every ethical hacker wishes developers knew about cyber security.
4 steps to transforming developers into security people
Modern developers are caught between a rock and a hard place. On one hand, businesses are requiring faster application delivery from their development staff. As software plays an increasingly important role in the modern business, developers regularly face impossible deadlines.
Rigorous input testing, passwords, encryption -- 17 ways to write secure code
Do you want to know how to make your website more secure? Here you will learn about the best security strategies that you can put into action right now to keep your website from being an easy target for hackers.
The dirty dozen of application development pitfalls — and how to avoid these all-too-common programming blunders
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218.pdf
Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnera...
The Biden administration hopes the voluntary effort helps inform consumers and compels manufacturers to improve internet of things security.
Microsoft is adding AI art generation to its Office suite with a new app, Microsoft Designer. The app uses OpenAI’s DALL-E model to generate images which Microsoft says can be used for stock illustrations and drawings. Just like clip art.
Arthub.ai is a creative community for showcasing, discovering and creating AI generated art.
A survey of technology buyers revealed that companies are changing their tech spending habits, but overall budgets aren't expected to shrink.
A recent Gartner survey of 304 infrastructure and operations leaders was conducted to understand the state of I&O automation.
Getting developers to embrace security requires more than DevSecOps. Education, better security tooling, and stronger motivations are the key.
Everything you need to know about securing the software supply chain. Infografía
Everything you need to know about securing the software supply chain.
Software developers have a lot to think about. Does the code work? Does the software have all the functionalities the client wants?