433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

The state of coordinated vulnerability disclosure policies in EU

The European Union Agency for Cybersecurity (ENISA) publishes a map of national coordinated vulnerability disclosure (CVD) policies in the EU Member States and makes recommendations. Vulnerability disclosure has become the focus of attention of cybersecurity experts engaged in strengthening the cybersecurity resilience of the European Union. The valid source of concern comes from the cybersecurity threats looming behind vulnerabilities, as demonstrated by the impact of the Log4Shell vulnerability. Security researchers and ethical hackers constantly scrutinise … More → The post The state of coordinated vulnerability disclosure policies in EU appeared first on Help Net Security.
http://news.poseidon-us.com/SNppy5

81% of codebases contain known open source vulnerabilities

Synopsys released a report which examines the results of more than 2,400 audits of commercial and proprietary codebases from merger and acquisition transactions, and highlights trends in open source usage within commercial and proprietary applications and provides insights to help developers better understand the interconnected software ecosystem. The report also details the pervasive risks posed by unmanaged open source, including security vulnerabilities, outdated or abandoned components, and license compliance issues. The findings underscore the fact … More → The post 81% of codebases contain known open source vulnerabilities appeared first on Help Net Security.
http://news.poseidon-us.com/SNpmXR

81% of codebases contain known open source vulnerabilities

Synopsys released a report which examines the results of more than 2,400 audits of commercial and proprietary codebases from merger and acquisition transactions, and highlights trends in open source usage within commercial and proprietary applications and provides insights to help developers better understand the interconnected software ecosystem. The report also details the pervasive risks posed by unmanaged open source, including security vulnerabilities, outdated or abandoned components, and license compliance issues. The findings underscore the fact … More → The post 81% of codebases contain known open source vulnerabilities appeared first on Help Net Security.
http://news.poseidon-us.com/SNpmXR

Is your security organization ripe for a reorg?

With more than two decades of enterprise security experience, Daniel Schwalbe has seen both how the profession has changed and how the structure of security teams has evolved. He recounts, for example, how his former security department reported to network operations when he first started there in the late 1990s. Buried deep in IT, he got the sense that “people didn’t want to talk to us.”[ Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. | Sign up for CSO newsletters. ] But over the years security moved out from under network operations and into a dedicated CISO office. Security then began to branch out. To read this article in full, please click here
http://news.poseidon-us.com/SNmSBJ

Is your security organization ripe for a reorg?

With more than two decades of enterprise security experience, Daniel Schwalbe has seen both how the profession has changed and how the structure of security teams has evolved. He recounts, for example, how his former security department reported to network operations when he first started there in the late 1990s. Buried deep in IT, he got the sense that “people didn’t want to talk to us.”[ Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. | Sign up for CSO newsletters. ] But over the years security moved out from under network operations and into a dedicated CISO office. Security then began to branch out. To read this article in full, please click here
http://news.poseidon-us.com/SNmSBJ

The price of an accelerated digital transformation

F5 announced a report which shows the challenges organizations face as they transform IT infrastructures to deliver and secure digital services that have become inseparable from everyday activities, such as completing job tasks or consulting a doctor. With highly distributed architectures and a broader threat landscape resulting from an ongoing digitization of previously physical experiences, organizations are turning to a variety of solutions to help manage complexity and address widening IT skills gaps. However, survey … More → The post The price of an accelerated digital transformation appeared first on Help Net Security.
http://news.poseidon-us.com/SNlxB6