As we kick off 2025, software's role in our daily lives has never been more apparent, and the integrity of our open source ...
The Application Security (AppSec) landscape is changing fast. With recent high-profile breaches and a wave of new Application ...
As we begin 2025, artificial intelligence (AI) continues to be both a game-changer and a point of contention in the software ...
Beyond the Perimeter: Addressing Blind Spots in Identity Security for 2025. Our founder Simon Moffatt will be in conversation ...
Too many AST tools create noise for security and dev teams. Learn why automation is key to finding and fixing what’s important.The post Overcome AST noise to find and fix software vulnerabilities ...
Source Defense With the introduction of PCI DSS 4.0, merchants are now grappling with new requirements that aim to enhance the security of cardholder data. At a QSA roundtable hosted by Source Defense ...
Torq has extended the reach of the generative artificial intelligence (AI) capabilities spanning its security operations center (SOC) platform to now include multiple agents.
DigiCert has made available a Domain Control Validation (DCV) library under an open-source software license as part of a larger effort to enable certificate authorities (CAs) to reduce total costs.
Knowing that insider threats and poor cyber hygiene are well-known as some of the worst threat vectors, prioritizing security controls that can keep pace with modern threats is fundamental for all ...
Every year brings new challenges — more threats, new techniques, more astute perpetrators and we should be prepared for 2025.
ExtraHop. He brings more than 30 years of cybersecurity experience helping customers understand and mitigate the risk contemporary threats pose to their business.
Join us as we reminisce about Y2K, the panic, the preparations, and the lessons learned 25 years later. We also discuss the implications for future technology like AI and potential cybersecurity ...