How long do you put off restarting your computer, phone, or tablet for the sake of a security update or software patch? All too often, it's far too long. Updating your devices is a tedious, ...
Supply chain security is rapidly emerging as a material risk for enterprise software buyers. Yet, despite best efforts from regulators to hold software publishers accountable, enterprise buyers ...
The Post Office Horizon scandal was not merely a software failure; it was a failure of trust, oversight, and organisational ...
Sounil Yu, CISO at JupiterOne, discusses software bills of materials (SBOMs) and the need for a shift in thinking about securing software supply chains. In the wake of the SolarWinds attack last year, ...
Within a zero-trust environment, there is no implicit trust. Thus, trust must be sourced from somewhere else in order to gain access to protected resources. Actions speak louder than words. Reliable ...
Software-defined perimeter can be an important part of Zero Trust that enforces network access, but first plan the Zero Trust architecture and the changes that means for the network and security. Zero ...