article thumbnail

On Software Liabilities

Schneier on Security

Over on Lawfare, Jim Dempsey published a really interesting proposal for software liability: “Standard for Software Liability: Focus on the Product for Liability, Focus on the Process for Safe Harbor.” I have long been a fan of software liability as a policy mechanism for improving cybersecurity. Full paper here.

Software 245
article thumbnail

On the Insecurity of Software Bloat

Schneier on Security

Good essay on software bloat and the insecurities it causes. The world ships too much code, most of it by third parties, sometimes unintended, most of it uninspected. Because of this, there is a huge attack surface full of mediocre code.

Software 253
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Google Search to Find Software Can Be Risky

Krebs on Security

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. And by most accounts, the threat from bad ads leading to backdoored software has subsided significantly compared to a year ago. com , filezillasoft[.]com

Software 240
article thumbnail

The Software-Defined Car

Schneier on Security

Developers are starting to talk about the software-defined car. The behavior of new cars is increasingly defined by software, too. But keep in mind that, of course, the more software there is in the car, the more risk is there for vulnerabilities, no question about this,” Anhalt said. They’re highly secure.

Software 237
article thumbnail

How to Generate Revenue Using Software Intelligence

Did you know there are people who already use and love your software, but aren't paying for it? Add More Opportunities to Your Pipeline. Compliance analytics allow you to quantify unlicensed use of your products and accelerate your revenue recovery efforts.

article thumbnail

Risks of Evidentiary Software

Schneier on Security

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example). Bugs and vulnerabilities can lead to inaccurate evidence, but the proprietary nature of software makes it hard for defendants to examine it.

Software 313
article thumbnail

Securing Open-Source Software

Schneier on Security

Good essay arguing that open-source software is a critical national-security asset and needs to be treated as such: Open source is at least as important to the economy, public services, and national security as proprietary code, but it lacks the same standards and safeguards.

Software 278
article thumbnail

Making Software Pirates Pay: An E-Commerce Playbook

Vendors large and small have been using software intelligence to understand who is using unlicensed versions of their software so they can develop data-driven strategies to identify and convert unpaid users, generating new license revenue. An E-Commerce Conversion Playbook.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it.

article thumbnail

7 Tips for Developing an In-Application Messaging Strategy

Software vendors are always looking for new ways to convert prospects to customers; and if you're selling your software online, driving and converting shopping cart traffic is crucial to driving new revenue. You will learn how to: Identify unpaid users of your software. Alert these users of their unlicensed status.

article thumbnail

Take the Guesswork Out of Product Management

Speaker: Daniel Barrett and Michael Goff, Revenera

If you’re not using software usage analytics to understand how users engage with your applications, you’re missing valuable insight that can take the guesswork out of product management. Watch this webinar and you will learn why Gartner predicts that 75% of software providers will rely on insights from software usage analytics by 2021.

article thumbnail

Monetization Monitor: Monetization Models and Pricing 2020

Customers demand—and suppliers offer—a diverse mix of monetization models for Software and Digital Services related to IoT Devices. Approximately a third (34%) of respondents in this year’s annual software and IoT monetization survey still rely on homegrown solutions.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. All of these stats beg the question, “Do you know what’s in your software?”

article thumbnail

Monetization Monitor: Software Usage Analytics 2020

Yet many software suppliers still struggle to get accurate insights into usage. Revenera’s 2020 Software Monetization and Pricing survey gathers input from leading software companies and provides you with key insights. Other deployment models aren't far behind (68% of on-premises and 71% of embedded software suppliers).