Secure Software Development Attestation Form: Sonatype helps you comply

Secure Software Development Attestation Form: Sonatype helps you comply

On March 11, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and the Office of Management and Budget (OMB) unveiled the final version of the Secure Software Development Attestation Form. This pivotal ...
GUEST ESSAY: A DIY guide to recognizing – and derailing –  Generative AI voice scams

GUEST ESSAY: A DIY guide to recognizing – and derailing – Generative AI voice scams

Americans lost a record $10 billion to scams last year — and scams are getting more sophisticated. Related: Google battles AI fakers Recently used to impersonate Joe Biden and Taylor Swift, AI voice cloning ...
What are SBOM standards and formats?

What are SBOM standards and formats?

The growing importance of software bills of materials (SBOMs) marks a significant shift towards better transparency and security in software management ...
News alert: Badge expands availability of ‘Enroll Once and Authenticate on Any Device’ software

News alert: Badge expands availability of ‘Enroll Once and Authenticate on Any Device’ software

San Francisco, Calif., Mar. 7, 2024 — Badge Inc., the award-winning privacy company enabling Identity without Secrets™, today launched a new Partner Program and welcomed Identity Data Management and Analytics provider Radiant Logic ...
Women in cybersecurity: On the shoulders of giants

Women in cybersecurity: On the shoulders of giants

$11.5 trillion - the Gross Domestic Product (GDP) of the world's third-largest economy after the United States and China. However, this is not a country. It's the estimated cost of cybercrime to ...

Russian Hackers Target Ukraine Via A Disinformation Campaign

Disinformation campaigns play an important role in cyber warfare, and this is exactly what Russian hackers target Ukraine. After waging war on Ukraine on land, Russia is attacking the East European country ...
Browserless Entra Device Code Flow

Browserless Entra Device Code Flow

Zugspitze, Bavaria, Germany. Photo by Andrew ChilesDid you know that it is possible to perform every step in Entra’s OAuth 2.0 Device Code flow — including the user authentication steps — without a browser?Why that matters:Automating authentication flows enables ...

Pathlock Announces Release of First-of-its-Kind SAP Cybersecurity Product

Pathlock is pleased to announce the launch and general availability of its Cybersecurity Application Controls (CAC), the first-ever SAP cybersecurity product designed to safeguard business data from breaches and exploitation. This innovative ...
Embracing the AI revolution: Navigating the impact on developers

Embracing the AI revolution: Navigating the impact on developers

In the wake of transformative advancements in generative artificial intelligence (AI) and machine learning (ML), the landscape of software development is undergoing a significant shift ...