What will your team do if a software component or a supplier’s entire software suite becomes untrustwort […]
From a nuclear meltdown to Y2K and 9/11, Joe Weiss paints a frightening picture of cyber vulnerabilities in th […]
The Product Security community has had a rough go of it lately. Ransomware attacks, New regulation, Greater i […]
Two years following one of the worst cyber-espionage attacks on the USA, we sat down with Thomas LaRock from S […]
Shlomi Ashkenazy and David Leichner recap the highlights of the past year and light the beacon for Product Sec […]
Securing automotive software is crucial to life long product security in the field…. But how can you secure a […]
Originally published on BeepingComputer, May 25, 2022 As medical devices become more connected and reliant on […]
As connected products and devices become increasingly software reliant, and the cyber threat landscape continu […]
If you want to see where industry priorities lie — the general consensus is that you should follow the money. […]