article thumbnail

Technology and Policymakers

Schneier on Security

Technology is now deeply intertwined with policy. Software constrains behavior with an efficiency that no law can match. It's all changing fast; technology is literally creating the world we all live in, and policymakers can't keep up. But AI is just one of many technological areas that needs policy oversight.

article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

Related: Pushing the fly-by-wire envelope This is especially true because systems are more interconnected and use more complex commercial software than ever before, meaning a vulnerability in one system could lead to a malicious actor gaining access to more important systems. Risks delineated Still, there have been many other incidents since.

Software 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: How SPDX helps reconcile interdependencies of open, proprietary software

The Last Watchdog

Software today is built on a combination of open source and proprietary software packages. Developers can reuse and build on the packages created by others, which results in the rapid creation of new capabilities and technologies. We started the Software Package Data Exchange® (SPDX®) project in 2010. History of SPDX.

Software 246
article thumbnail

GUEST ESSAY: The many benefits of infusing application security during software ‘runtime’

The Last Watchdog

This notorious incident highlights the security risks associated with open-source software, and the challenges of protecting web applications against zero day attacks. Make sure that software and operating systems are kept up to date and patched. Make sure that software and operating systems are kept up to date and patched.

Software 211
article thumbnail

Top 10 IdentityIQ Blog Posts of 2022

Identity IQ

Top 10 IdentityIQ Blog Posts of 2022. With a final look back at 2022, we’re rounding up the most searched and visited blog posts from last year. The top 10 most popular blog topics on the IdentityIQ website last year include: What to Do if My Email Is Found on the Dark Web? How Important are Phone Software Updates?

article thumbnail

GitHub Actions Blog Series, Part 2: Deploying with Amazon EKS

Security Boulevard

Over the past few years, we’ve seen almost every company that runs software change their strategies to include some type of cloud technology to support their workloads. The post GitHub Actions Blog Series, Part 2: Deploying with Amazon EKS appeared first on Security Boulevard.

article thumbnail

IT and Software Consultancy Company Globant Got Hacked

Heimadal Security

Globant is an information technology and software development company with more than 16,000 workers globally and projected sales of $1.2 The post IT and Software Consultancy Company Globant Got Hacked appeared first on Heimdal Security Blog. billion in 2021.