Supply Chain Economics and Cybersecurity
Lets face it, supply chains are complex and distributed. Operations matter, and for some it is truly a miracle how many coordinated parts come together into a seamless operation. In…
Embracing DevSecOps with Automated Software Binary Security
DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often…
The Lottery You Don’t Want to Win: Introducing the RunSafe Pwn Index™
Financial instruments have given enterprises good tools and processes by which to manage their risk, but there is absolutely no limit to the amount of threat intelligence that security teams…
Beating Vendor Fatigue: Considerations for Choosing the Right Cybersecurity Provider
Organizations often perceive cybersecurity as a necessary evil.슠They know that its critical to protect business assets but its seldom seen as a driver that helps move the business forward. Its…
CEO Insights: Why Cybersecurity is an enablement of IIoT
Lucian Fogoros: How would you rate the level of cybersecurity awareness among industry in general? What level of uptake do you see regarding the level of cybersecurity best practices and…
The state of auto cybersecurity: current vulnerabilities in connected vehicles
As the automotive industry adds more software and connections into vehicles, it simultaneously increases the probability of cyberattacks due to vulnerabilities. Right now, the average car has about 100 million…
Top Four Methods to Protect Your Open Source Software
What the Old Ways for Source Code Security Are Lacking Open source software, in its three decades of existence, has experienced rapid growth and adoption within the software development landscapeand…
Top five largest cyber-attacks in the past year and lessons learnt
Sponsored by RunSafe Security Cyberattacks are becoming far too common, especially after the COVID-19 pandemic, as companies are changing how theyre doing business. Large cyber-attacks on enterprises software, in particular,…
Are We Doing Enough to Secure the US Power Grid?
An Executive Order from US President Donald Trump in May this year overhauled the backbone of the nations electricity infrastructure, highlighting gaps and vulnerabilities in the operations of power systems…
Maximize IIoT Device Profitability and Customer Satisfaction with Yocto
To maximize IIoT device profitability and customer satisfaction, users can take a few simple steps to augment yoctos robust platform with tooling to increase security and decrease update frequency, while…
The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into슠fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System…