Software Contract Solutions

Feds’ demand for software standards could boost enterprise security

An executive order issued in May by the Biden Administration has elevated the status of the software bill of materials, by mandating their use in federal government contracting. Enterprises can look for more transparency from software vendors after the Biden Administration’s recent mandate that software bills of materials be provided by companies attempting to do … Read more

What are the security priorities for the post-coronavirus world?

The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritizing? Earlier in 2020, Computer Weekly and TechTarget published the results of our annual IT Priorities study, a wide-ranging look at what is currently … Read more

Ransomware a continued threat to business, report warns

Businesses are increasingly becoming the most popular targets for ransomware, which remains a top cyber threat around the world, especially in the US, a report reveals. Business ransomware detections increased by 365% in the past year, dominated by Ryuk and Phobos which increased 88% and 940% respectively, a report on cyber crime trends reveals. GandCrab and Rapid ransomware attacks … Read more

Cybersecurity: One in three breaches are caused by unpatched vulnerabilities

Flaws are left open for weeks or longer even when fixes exist, security experts admit, leaving organizations at risk. Forget the stealthy hacker deploying a never-before-seen zero day to bring down your network. IT security professionals admit that one in three breaches are the result of vulnerabilities that they should have already patched. Software vendors … Read more

Cyber criminals targeting C-suite, DBIR shows

Executives and cloud-based services are gaining popularity as targets for cyber criminals, according to the latest data breach investigations report. C-level executives who have access to a company’s most sensitive data are increasingly and proactively targeted by cyber criminals, correlating to a rise in social engineering attacks with financial motivation, Verizon’s 2019 Data breach investigation report (DBIR) reveals. Cloud-based services are … Read more

Business email compromise made easy for cyber criminals

Poor security practices and access to hacking services are making it easy for cyber criminals to compromise business email, research reveals. Around 12.5 million company email boxes and 33,000 finance department credentials are openly accessible on the web, research from digital risk management and threat intelligence firm Digital Shadows has found. This is making it … Read more

Securing the future: The evolution of cyber security in the wake of digitalization

cyber security in the era of digitalization

With threats becoming more complex, moving from basic attacks against one device to complicated attacks against every device on an organisations network, traditional security simply isn’t enough in the age of digitalization.  Thinking back 30 years, heads of IT had a comparatively enviable task when it came to cyber security. Although the job was by … Read more

Full Disclosure Applies to Internal Security Too

internal security

If you’ve been keeping up with the news, you’ve probably noticed a few recent reports about companies that may have been a little less than candid about security issues. For example, we recently learned that Uber experienced a breach in 2016. As we’ve also learned from subsequent press reports, the company may have paid the … Read more

Tackling security with container deployments

container deployment security

The most effective and proactive way of controlling that security risk is by finding and removing vulnerabilities in base images. Containers provide an effective way to deliver a compact, portable environment for running applications across shared server resources. But enterprises are advised to take precautions before embracing this approach to operating-system-level virtualization. Security risks unique … Read more