The shift to renewable energy leaves oil, gas, and electrical infrastructure vulnerable to threats such as ransomware, DDoS, and more, CISO Chris Hughes explains.
Search Results: open-source software (171)
The capabilities of Snyk for automatic discovery & remediation have positioned it to shift security left. However, vendor solutions only go so far.
A sustainable future is not out of reach but depends on how we continue efforts to build resilient cybersecurity frameworks which support the critical infrastructures, IoT, and open-source solutions we all depend on.
Bill reconnects with Sonatype Co-founder Brian Fox to find out why it’s taken so long for organizations to respond to the Log4j vulnerability, which was first discovered a year ago.
Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.
In Ep. 3 of the Acceleration Economy Minute, Kieron references the work of fellow AE cybersecurity analysts who discuss how and why organizations must expand on their approach to defense.
The Software Bill of Materials (SBOM) increases transparency and is expected to become an integral part of the software industry. Bill Doerrfeld explains why, and what organizations must do about it.
With open source at the core of modern technology, abilities to identify and remediate vulnerabilities are becoming increasingly critical.
As organizations are increasingly adopting multiple clouds, they need to be prepared to onboard hybrid multi-cloud technologies securely.
The cloud-native approach will modernize enterprise software architecture — but what are the security implications? Bill Doerrfeld explains.
As IT moves to the cloud, new threats emerge. DevSecOps is the answer to incorporating security throughout the continuous software lifecycle.
As the Metaverse becomes more ingrained into the worldwide economy, its data will become a valuable attack target. Here’s how to protect it.
Freely accessible software is everywhere, continues to grow, and keeps contributing technological progress in our everyday lives and economies.
Shortly on the heels of the Log4j is a new exploit in the Spring Framework, Spring4Shell. Here we explore what it is and how to mitigate it.
In addition to projects in the Metaverse, blockchain has greater potential if developers break through the roadblocks to further applications.
Cybersecurity experts are warning about a newly discovered software vulnerability, called Log4j, which poses a security risk to businesses that…
There’s much to learn about SBOM, as it provides valuable insights that might otherwise take significant effort to discover.
Understanding AI in any practical sense is still hard for many to grasp. However, H2O.ai seeks to change that with its “Explainable AI” approach. Will this translate into long-term consumer impacts?
Learn why NVIDIA currently ranks in the top position among the AI Ecosystem Top 12 pioneers, as well as its latest developments in supercomputers and quantum computing.
Oracle’s Database 23ai supports six key AI approaches to enable what the company calls the “AI for Data revolution.”