Almost every system used by the Department of Defense (DoD) depends on software. This dependence is not a new development, but the criticality of software has grown markedly over the past few decades.
A new Software Acquisition Guide: Supplier Response Web Tool has been released by the US Cybersecurity and Infrastructure Security Agency (CISA) to improve security in software procurement. The free, ...
HP plans to scoop up Fortify Software, a privately held security software company, in a bid to lock down applications throughout their life cycle. Neither HP nor Fortify disclosed the sum of the ...
Datadog’s DDOG security portfolio is emerging as a meaningful growth catalyst as the company moves beyond its observability foundation into broader security operations. Its multi-layered suite spans ...
My friend and colleague Dan Swanson, CIA, runs a useful information assurance (IA) news and discussion service and has a valuable list of useful IA resources for us. I’m impressed by the quality of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results