The software security landscape is at an interesting juncture. As Jen Easterly, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), pointed out, there is a lesson to be ...
Wylie Wong is a freelance journalist who specializes in business, technology and sports. He is a regular contributor to the CDW family of technology magazines. Two years ago, Russian foreign ...
In 1965, Ralph Nader’s groundbreaking book Unsafe at Any Speed exposed how car manufacturers prioritised style, performance, and profit over the safety of drivers and passengers. His narrative spurred ...
Customer satisfaction is key to product success. That’s why development teams are often tempted to prioritize application performance and functionality, hoping to introduce necessary cybersecurity ...
SentinelOne, Microsoft Defender for Endpoint, and CrowdStrike Falcon are among my top recommendations for businesses looking ...
In today's connected world, our digital lives hold vast amounts of personal information — from financial records to private conversations. With increasing cyber threats, essential software security is ...
Why bugs and misconfigurations pose as much of a cyber threat as hackers.
On January 23, 2026, the Office of Management and Budget (OMB) reversed some relatively new requirements for secure software development that had been imposed on federal contractors. This move is ...
If one event demonstrated how vulnerable organisations and infrastructure around the world are to software vulnerabilities, it was Log4j. The critical zero-day vulnerability in the Java logging ...
Discover Avast’s free version. Get full details on its key features, how it protects your device, how to safely install it, ...
For all the scary talk about cyberattacks from vendors and industry experts, relatively few attacks are actually devastating. But the Jaguar Land Rover (JLR) attack was. The JLR breach wasn’t some ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results