DoD weapon systems remain vulnerable to cyber attack. It’s not clear which ones will actually be able to perform when needed. The VxWorks/URGENT 11 vulnerabilities offer another example. VxWorks is a real-time operating system (RTOS) used in embedded systems. It is...
Securing a large complex enterprise network is a challenging, never-ending process. The move to cloud has intensified the problem. Often, there is nothing to protect an IT system when a breach makes it past perimeter defenses. Moreover, memory corruption bugs are...
DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but rather...
Financial instruments have given enterprises good tools and processes by which to manage their risk, but there is absolutely no limit to the amount of threat intelligence that security teams can benefit from having at their disposal. To help enterprise security teams...
Organizations often perceive cybersecurity as a necessary evil. They know that it’s critical to protect business assets but it’s seldom seen as a driver that helps move the business forward. It’s a checkbox, a requirement that is begrudgingly addressed to reduce risk...