software
![syringe](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094041/syringe1-400x200.jpg)
SQL injection: The bug that seemingly can’t be squashed
If you’re in a hands-on cybersecurity role that requires some familiarity with code, chances are good that you’ve had to think about SQL injection over and over (and over) …
![Code42 Incydr](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/04081846/code42-incydr-review-400x200.jpg)
Review: Code42 Incydr – SaaS data risk detection and response
Incydr is Code42’s new SaaS data risk detection and response solution, which enables security teams to mitigate file exposure and exfiltration risk without disrupting …
![programming](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095527/programming-400x200.jpg)
Three ways formal methods can scale for software security
Security is not like paint: it can’t just be applied after a system has been completed. Instead, security has to be built into the system design. But how can we know that a …
![Alice & Bob Learn Application Security](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/21152916/book-learn_appsec-400x200.jpg)
Review: Alice & Bob Learn Application Security
Tanya Janca, founder of We Hack Purple, an online learning academy, community and podcast that teaches how to create secure software, is also known as SheHacksPurple and is …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092947/lock-400x200.jpg)
Secure enclave protection for AI and ML
You can’t swing a virtual bat without hitting someone touting the value of artificial intelligence (AI) and machine learning (ML) technologies to transform big data and human …
![Code](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/10182058/code-glasses-400x200.jpg)
High-risk vulnerabilities discovery increased 65% in 2020
2020 has been a record year for crowdsourced cybersecurity adoption, with enterprises across all industries implementing crowdsourced cybersecurity programs to keep up with …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
How to make DevSecOps stick with developers
While DevOps culture has brought innovation to the industry and transformed the way software is developed, it’s arguably an outdated concept. The truth is that DevOps has …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094431/open-400x200.png)
Open source contributors spending no time on security
The Linux Foundation’s Open Source Security Foundation (OpenSSF) and the Laboratory for Innovation Science at Harvard (LISH) announced the release of a report which details …
![MacBook Pro](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/22132713/macbookpro-400x200.jpg)
How can companies secure a hybrid workforce in 2021?
This has been a uniquely transformative year. Prompted by a global pandemic, we’ve been forced to change many things about how we live, work, and relate. For most businesses, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
The challenges of keeping a strong cloud security posture
It’s simple – you can’t secure what you can’t see or don’t know about. In this interview, Badri Raghunathan, Director of Product Management for Container and Serverless …
![NIST mask research](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/28114110/nist-facemask-research-400x200.jpg)
Face recognition software making progress at recognizing masked faces
A study of face recognition technology created after the onset of the COVID-19 pandemic shows that some software developers have made demonstrable progress at recognizing …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104208/IoT-400x200.jpg)
New wave of affordable silicon leading to greater IoT project success
With up to 75 percent of remote device management projects deemed “not successful,” in 2020, IoT deployment has been limited in realizing its full potential. Path to IoT …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints