article thumbnail

Secure by Design: Google’s Perspective on Memory Safety

Google Security

In this post, we share our perspective on memory safety in a comprehensive whitepaper. We'll also highlight our commitments towards implementing several of the solutions outlined in the whitepaper, most recently with a $1,000,000 grant to the Rust Foundation , thereby advancing the development of a robust memory-safe ecosystem.

Software 109
article thumbnail

Cybersecurity Labeling of IoT Devices: Will It Happen in 2023?

SecureWorld News

In an effort to communicate the risks that come along with using internet-connected devices, the Council is gathering representatives from consumer product associations, technology think tanks, and manufacturing companies at the White House next week for a workshop. In February 2022, the U.S. Will the program get off the ground?

IoT 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco Secure: Supporting NIST Cybersecurity Framework

Cisco Security

National Institute of Standards and Technology (NIST) developed the Cybersecurity Framework (CSF) exactly for this reason. NIST CSF is a voluntary framework based on existing standards, guidelines and practices for reducing cyber risks. It enables organisations to discuss, address and manage cybersecurity risk. ISO27000 series?

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Related: Atrium Health breach highlights third-party risks. Third-party cyber risks are likely to persist at the current scale for a while longer. According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk.

article thumbnail

News Alert: Utimaco finds regional disparities in consumers’ level of trust in digital security

The Last Watchdog

The research found a central contradiction of digital life: consumers were very enthusiastic about digital offerings, from connected vehicles to digital health services, but they were equally wary of security risks around these digital services.

article thumbnail

Where You Can Find the Industry-First Software Supply Chain Security Toolkit

Security Boulevard

The Software Supply Chain toolkit consolidates advice and recommendations from multiple frameworks and whitepapers that each provide comprehensive guidance for software supply chain security including: CNCF ‘Software Supply Chain Best Practices’ whitepaper. The Top Software Supply Chain Attacks: Code Signing at Risk.

article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

This problem is magnified by the adoption of newer technologies, such as cloud, big data, internet of things (IoT), software containers and other transformative technologies that make defining a perimeter much more difficult. Perimeter defense, while necessary, is not enough to protect our sensitive data.