Remove Government Remove Risk Remove Whitepaper
article thumbnail

Whitepaper: The Intersection of Technical Debt and Cybersecurity

Approachable Cyber Threats

Risk Level. The term “technical debt” has come to encompass a number of issues in the industry: bugs, legacy code, missing documentation, “silver bullet” tooling, poor system visibility, old hardware assets, weak governance, and more. Category Guides, Cybersecurity Fundamentals. Don’t worry about that documentation for now.” “We

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Related: Atrium Health breach highlights third-party risks. Third-party cyber risks are likely to persist at the current scale for a while longer. According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Secure by Design: Google’s Perspective on Memory Safety

Google Security

In this post, we share our perspective on memory safety in a comprehensive whitepaper. We'll also highlight our commitments towards implementing several of the solutions outlined in the whitepaper, most recently with a $1,000,000 grant to the Rust Foundation , thereby advancing the development of a robust memory-safe ecosystem.

Software 110
article thumbnail

News Alert: Utimaco finds regional disparities in consumers’ level of trust in digital security

The Last Watchdog

The research found a central contradiction of digital life: consumers were very enthusiastic about digital offerings, from connected vehicles to digital health services, but they were equally wary of security risks around these digital services.

article thumbnail

How can document readers help us fight COVID-19?

CyberSecurity Insiders

Throughout the COVID-19 pandemic, hotels offering quarantine have been indispensable tools for governments across the world. What’s more, hotels, notorious for outsourcing maintenance work to third parties, see multiple external workers enter and exit their premises every day, thus presenting potential severe transmission and security risks.

Risk 132
article thumbnail

MITRE ATT&CK: The Magic of Segmentation

Cisco Security

They abused its update system to disguise and deliver malicious code, impacting thousands of customers including high-value US government agencies. MITRE is well aware of supply chain risks, and they’re not alone. It relies on a policy tightrope: Too loose, and your organization remains at risk. Not new, but easily overlooked.

article thumbnail

Addressing the Spectrum of Risks

ForAllSecure

In this blog, we’ll walk through the spectrum of risk and the types of solutions that are strongest at addressing each risks. The cyber security market has found that this principle is applicable in software security risk management as well. Find comfort in knowing that this is a common struggle. Unknown to Self.

Risk 52