The increase in the demand for innovative software has effectively reshaped the software development industry itself. Today, speed and agility are paramount and development teams are pushed to deliver highly advanced applications in record time — which means that writing every single line of code from the ground up is often not a sustainable practice….

73 percent of IT security professionals believe countries with government-mandated encryption backdoors are more susceptible to nation-state attacks. The Venafi survey on government-mandated encryption backdoors evaluated the opinions of 517 IT security professionals attending the RSA Conference 2019. “This is a tense moment for industry professionals because they know backdoors make our critical infrastructure more…

As organizations embrace the cloud and new digital initiatives such as the IoT, blockchain and digital payments the use of trusted cryptography to protect their applications and sensitive information is at an all-time high. With corporate data breaches making the headlines on an almost daily basis, the deployment of an overall encryption strategy by organizations…

IT security’s greatest inhibitor to success is contending with too much security data. To address this challenge, 47 percent of IT security professionals acknowledged their organization’s intent to acquire advanced security analytics solutions that incorporate machine learning (ML) technology within the next 12 months. Such investments help to mitigate the risks of advanced cyberthreats missed…

Malicious cyber activities on Industrial Control System (ICS) computers are considered an extremely dangerous threat as they could potentially cause material losses and production downtime in the operation of industrial facilities. In 2018, the share of ICS computers that experienced such activities grew to 47.2 percent from 44 percent in 2017, indicating that the threat…

The one poignant lesson that crypto investors globally have learned over the years is that despite the immutable, impenetrable nature of the technology behind cryptocurrencies and blockchain, their crypto investments and transactions are not secure. 2018, for example, witnessed some of the largest crypto exchange hacks globally. Not to mention, the alarming volatility in the…

The concept of vulnerability management has undergone a number of changes in the last few years. It is no longer simply a synonym for vulnerability assessment, but has grown to include vulnerability prioritization, remediation and reporting. It has also grown in scope: vulnerabilities don’t just affect IT networks and databases, but also applications, cloud infrastructures,…