article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

Related: Pushing the fly-by-wire envelope This is especially true because systems are more interconnected and use more complex commercial software than ever before, meaning a vulnerability in one system could lead to a malicious actor gaining access to more important systems. It is difficult to deny that cyberthreats are a risk to planes.

Software 265
article thumbnail

Synopsys takes aim at software supply chain risks

InfoWorld on Security

Synopsys has introduced Black Duck Supply Chain Edition , a software composition analysis (SCA) package that helps organizations mitigate upstream risk in software supply chains, including from AI code.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Synopsys takes aim at software supply chain risks

InfoWorld on Security

Synopsys has introduced Black Duck Supply Chain Edition , a software composition analysis (SCA) package that helps organizations mitigate upstream risk in software supply chains, including from AI code.

article thumbnail

National Security Risks of Late-Stage Capitalism

Schneier on Security

Early in 2020, cyberspace attackers apparently working for the Russian government compromised a piece of widely used network management software made by a company called SolarWinds. For a while, in 2019, the update server’s password for SolarWinds’s network management software was reported to be “solarwinds123.”

Risk 361
article thumbnail

GUEST ESSAY: Leveraging DevSecOps to quell cyber risks in a teeming threat landscape

The Last Watchdog

In today’s digital landscape, organizations face numerous challenges when it comes to mitigating cyber risks. Related: How AI is transforming DevOps The constant evolution of technology, increased connectivity, and sophisticated cyber threats pose significant challenges to organizations of all sizes and industries.

article thumbnail

Ted Chiang on the Risks of AI

Schneier on Security

as a broad set of technologies being marketed to companies to help them cut their costs, the question becomes: how do we keep those technologies from working as “capital’s willing executioners”? Yet such software could easily still cause as much harm as McKinsey has. If you think of A.I. Alternatively, if you imagine A.I.

Risk 253
article thumbnail

The Ultimate Guide to Selecting Integrated Risk Management Software

Centraleyes

Many organizations tend to adopt a reactive approach to managing risks. They often wait until a high-profile event, a significant news story, or regulatory changes demand a reassessment of their existing risk management structures. This reactive strategy takes a terrible risk. Making an informed decision is key to success.