Software is becoming ever more sophisticated and powerful. Its advance and innovation can be tied directly to the proliferation of open source. As more open source components find their way into published software, it is critical that known security vulnerabilities within the software are uncovered and patched. Failure to do so will either significantly increase the number and cost of attacks or impair the adoption of new technologies powered by the software.
You may be already planning your 2018 budget, and a new or expanded security operations center (SOC) could be high on the list. New data shows that almost one in three organizations have their sights on having a leading SOC within three years, up from one in seven today. How should you invest? How should you measure impact?
Today's Chief Security Officers (CSOs) are worried about their investment, but more than that, they're worried about preserving employee safety, the safety of their data and the ability of their systems to integrate fully.
What image flashes in your mind when you hear the word cybersecurity? Is it a room filled with happy, diverse, productive people making a difference in the world around them? Sadly no. More than likely, it’s a guy hunched over his computer wearing a dark hoodie with some ones and zeros floating above his head.
Who are the Most Influential People in Security? Find out which security leaders are making a difference in the September issue of Security magazine! Also, read about how New York is shaking up cybersecurity, changes in drone legislation, three steps to prepare for the GDPR, school surveillance savings and more.