Just as consumers can look at a box of Twinkies and read a list of ingredients, so too should software makers provide users with a "bill of materials" explaining their composition, says Allan Friedman, director of cybersecurity initiatives at the U.S. National Telecommunications and Information Administration.
Software development over the past decade: The good news is that more organizations than ever have secure software development practices in place, says Chris Eng, chief research officer at Veracode. But the bad news is that many of the same flaws - including injection vulnerabilities - persist.
Malware defenses today too often function as black boxes, producing binary results that make it difficult for security teams to prioritize, when what's needed is transparency, to enable defenders to better understand threats and prioritize their response, says Mario Vuksan, CEO of ReversingLabs.
Deception technology has come of age in the marketplace, but there is still some customer confusion about the distinct use cases. Ofer Israeli, CEO of Illusive Networks, shares how mature companies deploy deception.
Marcus Fowler of Darktrace discusses the 2020 U.S. presidential election cyberthreat landscape and the roles that artificial intelligence and machine learning are now playing in mitigating more cyber risks.
Webroot just released its 2020 Threat Report. How has the landscape changed, and what cybersecurity predictions are made for 2020? Hal Lonas of OpenText shares insights and outlines the next round of research into artificial intelligence and machine learning.
From buzzword to practical application, artificial intelligence quickly has made an impact in cybersecurity - particularly in the security operations center. Bryce Schroeder of ServiceNow projects how AI and automation will continue to influence SOCs - and the analyst's role.
Among the top issues being discussed at the RSA 2020 conference this week is the need for more cybersecurity collaboration between government agencies and the private sector. Here are some interview highlights.
Implementing the concept of "privacy design" requires a series of critical steps, says Heikki Tolvanen, chief legal engineer at PrivacyAnt, a Finland-based privacy consulting firm, who offers insights on mistakes to avoid.
U.S. and U.K. officials are blaming the Russian military for launching an October 2019 cyberattack on the country of Georgia that crippled at least 2,000 government, news media and court websites over the course of one day.