Source Link Notable incidents such as SolarWinds and Log4j have placed a focus on…
Chris Hughes
-
-
Application SecuritySecurity
The Open Source Software Security Mobilization Plan: Takeaways for security leaders
by Chris Hughesby Chris HughesSource Link The Linux Foundation and the Open Source Security Foundation (OpenSSF) have introduced…
-
Mobile SecuritySecurity
MITRE ATT@CK v11 adds ICS matrix, sub-techniques for mobile threats
by Chris Hughesby Chris HughesSource Link The MITRE Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) Framework has become…
-
Network SecuritySecurity
New SDP 2.0 specification facilitates zero-trust maturity
by Chris Hughesby Chris HughesSource Link The Cloud Security Alliance (CSA) recently published the Software-Defined Perimeter (SDP) 2.0…
-
Cloud SecuritySecurity
Managing container vulnerability risks: Tools and best practices
by Chris Hughesby Chris HughesSource Link Containers are quickly becoming the de facto form of compute and workload…
-
Cloud SecuritySecurity
Keeping secrets in a devsecops cloud-native world
by Chris Hughesby Chris HughesSource Link Devsecops adoption is widely underway, with many organizations looking to break down…
-
Cloud SecuritySecurity
4 security concerns for low-code and no-code development
by Chris Hughesby Chris HughesSource Link There’s an increased push for what is being dubbed the citizen developer,…
-
Mobile SecuritySecurity
6 key points of the new CISA/NSA 5G cloud security guidance
by Chris Hughesby Chris Hughes5G, or 5th generation mobile networks, is among the most talked about technologies. At…
-
Cloud SecuritySecurity
The 3 biggest challenges of SASE in hybrid cloud environments
by Chris Hughesby Chris HughesDespite all the promises of secure access service edge (SASE), some challenges lie ahead…
-
Application SecuritySecurity
How software reliability can help drive software security
by Chris Hughesby Chris HughesSoftware security and reliability have been compared and contrasted for several years, with the…