


Denial of service vulnerability discovered in libraries used by GitHub and others

AWS security heads offer top cybersecurity predictions for 2023

Casper Labs report: Enterprises highly interested in blockchain, but adoption gap persists

AI threat detection that ‘understands you’ critical to thwarting attacks

AI adoption lagging? It may be a poor UI

Protecting your organization from rising software supply chain attacks

How CyberCube helps assess risk for cyber insurance

Open-source code is everywhere; GitHub expands security tools to help secure it

Shopping-related fraud: The coal in retailers’ stockings this holiday season

Creating the ultimate smart map with new map data initiative launched by Linux Foundation

5 New Year’s resolutions every CIO should make

Why developer-first security is needed from the start, from DevSecOps pioneer Snyk

Sustainability efforts deliver real bottom-line results, according to latest Vodafone survey

How Ngrok helps speed up application development with simplified ingress, self-service infrastructure

How the new Lands’ End-Movable Ink partnership leverages AI for customization

From passwords to passkeys: A guide for enterprises

How a misinformation-thwarting platform reduces enterprise risk

Why focusing on threats over tools can shrink your security stack

Automating governance, risk and compliance (GRC), Drata announces series C

When access is a privilege; Senhasegura bolsters its PAM platform

5 biggest announcements from AWS re:Invent

A new year, new cyberthreats, methods, protections

Crypto and blockchain will be Web3 key to securing the future of payments, one company says

Trust just enough: Veza opens platform to GitHub to foster authorization management

Cerebras unveils new partnerships for LLM and generative AI tools

Not giving up the (encryption) keys to the kingdom: Fortanix now integrated with AWS

The quandary of Kubernetes: How Rafay is helping curb cloud spending

Why cloud data protection calls for a ‘back-up-as-a-service’ model

Feature
Does the Google consumer data privacy fine go far enough?

Amazon RDS snapshots allow extensive leakage of personally identifiable information (PII)

Why inadequate automation of onboarding and offboarding results in security risks and data loss

How zero-trust methods thwart malicious hackers

How hybrid access-as-a-service (HAaaS) from Cloudbrink protects hybrid workforces

How Descript’s generative AI makes video editing as easy as updating text

How virtual reality and the metaverse are changing rehabilitation

GitHub’s Octoverse report finds 97% of apps use open source software

Access management, identity governance and privileged access features converge in new Okta cloud tools

Not ‘phoning it in’: Iterable’s new tools help marketers harness the power of SMS
