Syndicated Blog

Do cybersecurity certifications still deliver? Experts share 6 key insights

Do cybersecurity certifications still deliver? Experts share 6 key insights

| | security operations
Cybersecurity certifications continue to open doors and shape careers in security operations (SecOps). However, the mileage that individuals and organizations get out of certs can vary by industry, the specific demands of ...
With Quantum coming, NIST readies new software supply chain protection

With Quantum coming, NIST readies new software supply chain protection

While quantum computing is years away from practical deployment, it will pose a major threat to software supply chain security, and now is the time for security teams to prepare for that ...
Cybersecurity Does Not Have a Skill Shortage Gap (It's a Hiring Gap)

Cybersecurity’s workforce woes are a myth: 5 ways to rethink recruiting

The threat landscape is more challenging than ever, and the cybersecurity workforce is dogged by overwork and burnout. No wonder there's a cybersecurity talent shortage. Or is there? ...
5 SecOps automation challenges — and how to overcome them

5 SecOps automation challenges — and how to overcome them

| | security operations
A confluence of factors is driving the need for greater automation of security operations centers (SOCs). Primary among them are the growing sophistication of threats, the sheer volume of security-related data, the ...
Hacker Summer Camp: Reboot needed to tackle software supply chain threats

Hacker Summer Camp: Reboot needed to tackle software supply chain threats

“Everything under heaven is in chaos. The situation is excellent!” That is how Mao Zedong, the chairman of China's Communist party, read the state of affairs in China in the early 1960s ...
Secure by Demand: Key takeaways for enterprise software buyers

Secure by Demand: Key takeaways for enterprise software buyers

This week, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) took a major step forward as it continues to define federal software supply chain security policy. “Secure by Demand Guide: How Software ...
Software complexity is a real problem — and your AppSec must factor that in

Software complexity is a real problem — and your AppSec must factor that in

Achieving strong application security is hard even when AppSec and development teams are overseeing the simplest applications and the most streamlined application portfolios. But "simple" is relative. Most modern software products are ...
RL Spectra Advanced File Analysis and Malware Detection Suite Updates

RL Spectra Advanced File Analysis and Malware Detection Suite Updates

ReversingLabs is proud to announce new features for Spectra Analyze (formerly A1000) and Spectra Detect (formerly Titanium Scale). Our goal at ReversingLabs is to consistently improve the quality and efficiency of our ...
Cyber Risk Landscape Peer Report: 4 action items for your organization

Cyber Risk Landscape Peer Report: 4 action items for your organization

Traditional measures to detect and respond to cyberattacks are inadequate to protect organizations against modern data breaches, a new report has found ...

Application Security Check Up