ONCD releases report on the adoption of memory-safe languages
Memory safe programming languages can reduce common vulnerabilities.
National Cyber Director calls for software and hardware creators to prioritize addressing memory safety issues.
How New Relic's Kubernetes Agents team decreased release time by 99% with GitHub workflows
New Relic automated their software agent release process for the Kubernetes integration, reducing deployment time from two weeks to one hour per week.
New Relic improved their response to security vulnerabilities by enabling code-scanning tools in their continuous integration pipeline, automatically patching code without human interaction within a week of a fix being available.
US cyber officials issue urgent warning to millions of Apple users
Cyber officials urge Apple device updates for enhanced security.
Basic failures led to hack of Electoral Commission data on 40 million people | Computer Weekly
ICO reprimands Electoral Commission for basic security errors allowing Chinese hackers to access 40 million people's data.
Mitigating cyber risks in mergers and acquisitions
Acquisitions can pose significant security threats, as seen in cases like Dropbox, Marriott, and Yahoo, leading to data breaches, regulatory fines, and legal scrutiny.
Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel
A new technique can bypass Microsoft's Driver Signature Enforcement on patched Windows systems, allowing OS downgrade attacks with severe security implications.
ONCD releases report on the adoption of memory-safe languages
Memory safe programming languages can reduce common vulnerabilities.
National Cyber Director calls for software and hardware creators to prioritize addressing memory safety issues.
How New Relic's Kubernetes Agents team decreased release time by 99% with GitHub workflows
New Relic automated their software agent release process for the Kubernetes integration, reducing deployment time from two weeks to one hour per week.
New Relic improved their response to security vulnerabilities by enabling code-scanning tools in their continuous integration pipeline, automatically patching code without human interaction within a week of a fix being available.
US cyber officials issue urgent warning to millions of Apple users
Cyber officials urge Apple device updates for enhanced security.
Basic failures led to hack of Electoral Commission data on 40 million people | Computer Weekly
ICO reprimands Electoral Commission for basic security errors allowing Chinese hackers to access 40 million people's data.
Mitigating cyber risks in mergers and acquisitions
Acquisitions can pose significant security threats, as seen in cases like Dropbox, Marriott, and Yahoo, leading to data breaches, regulatory fines, and legal scrutiny.
Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel
A new technique can bypass Microsoft's Driver Signature Enforcement on patched Windows systems, allowing OS downgrade attacks with severe security implications.