Picking over code doesn’t guarantee problem-free software. Only automated scans that analyze first- and third-party code can provide the total visibility required to comply with the CRA and other new digital-security regulations.
The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space.
Segment Re...
We get a visit from Tanya Janca to discuss her latest book, Alice and Bob Learn Secure Coding!
Segment Resources:
Tanya's latest book on Amazon
Tanya's previous book, Alice and Bob Learn Application Security on Amazon
Tanya's website, She Hacks Purple
In this webcast, Adrian Sanabria, host of the Enterprise Security Weekly podcast, and Jack Carraway, Field CISO at Dataminr, discuss the growing importance of third-party risk management and how organizations can leverage AI and public data to gain better control over this critical security challenge.
As we approach the opening ceremony, cybersecurity experts are gearing up to face an array of potential cyber threats. Dave Stapleton, VP and CISO at ProcessUnity, outlines key steps the event planners must take into account.
Fifty-two percent of 172 widely deployed critical open-source projects had memory-unsafe code or were not written in programming languages that curb memory-related errors.
Fast Five
Selected by the SC Media Editorial team every Tuesday.
Sign up now for the top five issues cybersecurity pros need to know this week.