Small Business Innovation Research Program

The Ultimate Guide to SBIR and STTR Program Budgeting

| | security
The world advances based on innovation, and innovation can come from anywhere. The trouble is that the current capitalist economic system encourages large corporations to play conservatively with their products and their ...

What Makes Containers Vulnerable?

|
Read this quick guide to the types of vulnerabilities that affect containers. The post What Makes Containers Vulnerable? appeared first on Mend ...

USENIX Security ’23 – NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers

Authors/Presenters: *Yehuda Afek and Anat Bremler-Barr, Shani Stajnrod* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the ...
DevOps pioneers navigate organizational transformation

DevOps pioneers navigate organizational transformation

The latest webinar in Sonatype's DevOps Download series, presented in partnership with The New Stack, offered an in-depth exploration into how DevOps pioneers are catalyzing significant shifts within organizations ...
To Breach or Not to Breach

To Breach or Not to Breach

| | Informative
The rapid adoption of could computing was yesterday’s news 5 years ago. Today’s news is that one of the most critical cloud security technologies is woefully ineffective. In addition to efficacy, it ...
Randall Munroe’s XKCD ‘Eclipse Path Maps’

Randall Munroe’s XKCD ‘Eclipse Path Maps’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink ...

What to Consider When Choosing a Software Composition Analysis (SCA) Tool

| | SCA
Given the widespread use of third-party components in application development, identifying and remediating code vulnerabilities as early in development as possible is critical. As a result, many organizations turn to SCA tools, ...

DataDome Renews SOC 2 Type 2 Compliance

| | Product updates
DataDome's SOC 2 Type 2 compliance has been renewed for another year, further underlining that our security controls for customer data align with the AICPA's SOC 2 standard ...
Fixing a $12bn Challenge for Banks Through Data-Centric Security

Fixing a $12bn Challenge for Banks Through Data-Centric Security

The challenges presented by cyber risk have always loomed large for IT and business leaders in financial services. But today they have arguably reached a tipping point. The International Monetary Fund (IMF) ...
Arkose Accelerate – April 2024

Chatting with Theresa Payton: A Closer Look at Cybersecurity and Digital Innovation

Hey all! I want to share some highlights from a truly engaging talk at the latest Arkose Accelerate with Theresa Payton, former White House CIO and a noted cybersecurity expert. Theresa recently ...