What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, you should always get hardware and software from official, authorized and reputable sources and vendors, right? But

Read more

Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security

In the world of software development, microservices is a variant of service-oriented architecture (SOA). It is an architectural style in

Read more

It’s Time for an Automotive Cybersecurity Wake-Up Call

As the modern vehicle becomes smarter and more connected, everything from safety systems — such as steering, acceleration and brakes

Read more

Machine Learning Will Transform How We Detect Software Vulnerabilities

No one doubts that artificial intelligence (AI) and machine learning will transform cybersecurity. We just don’t know how or when.

Read more

Think Your Network Is Safe? If You Don’t Have Visibility Into Hardware Vulnerabilities, Think Again

Co-authored by Malgorzata Jablonska. If you follow basic security best practices and quickly patch software issues as they arise, you

Read more