Secure by Demand offers a starting point for third-party risk management teams, but they need to take the essential step of using a mature software supply chain security solution to ensure they’re not blindly trusting a provider’s software.
China’s Cyber Offensives Built in Lockstep With Private Firms, Academia
The scale of Beijing’s systematic tapping of private industry and universities to build up its formidable hacking and cyber-warfare capabilities is larger than previously understood.
Microsoft Highlights Security Exposure Management at Ignite
Building on its broad security portfolio, Microsoft’s new exposure management is now available in the Microsoft Defender portal, with third-party connectors on the way.
MITRE: Cross-Site Scripting Is 2024’s Most Dangerous Software Weakness
In addition to XSS, MITRE and CISA’s 2024 list of the 25 most dangerous security vulnerability types (CWEs) also flagged out-of-bounds write, SQL injection, CSRF, and path traversal.
Study Finds 76% of Cybersecurity Professionals Believe AI Should Be Heavily Regulated
Endace Establishes Middle East Regional Headquarters in Saudi Arabia
Norton Introduces Small Business Premium for Business-Grade Security
Microsoft Takes Action Against Phishing-as-a-Service Platform
The ONNX infrastructure has been servicing criminal actors as far back as 2017.
Apono Enhances Platform Enabling Permission Revocation and Automated Access
RSA Conference 2025 Innovation Sandbox Contest Celebrates 20th Anniversary
Starting in 2025, the RSAC Innovation Sandbox Top 10 Finalists will each receive a $5 million investment to drive cybersecurity innovation.