Veracode makes software that tests your software for vulnerabilities. Software developers use Veracode’s product to see if their software is vulnerable. Here is some information based on scanning over one million applications: Veracode says that AI-Generated code brings security bugs at scale and will likely add to security or technical debt. AI tools might also […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security or convenience, pick one. Background: there is a difference between IDENTIFICATION and AUTHENTICATION. Identification is the equivalent of a userid. Userids are not secret. Authentication is the equivalent of a password. Passwords are secret. Many systems use biometrics like a face scan to BOTH identify a user and authenticate that it is really that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Assuming you are like every other company, you communicate with people. People like employees, customers, suppliers and the media. Given what we are seeing, already, with deepfakes and the the fact that this is only just starting, what is your plan to protect your reputation? Would a competitor or someone else publish a photo, video, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As companies continue to expand their use of third party providers, the issue of security also expands. A cloud database belonging to CU Solutions Group, a service provider to credit unions, was left unsecured. More on that in a minute. That would make them a third party service provider to credit unions. Except …….. When […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The feds are pushing pretty hard to get software makers to create and manage Software Bills of Materials or SBoMs. What the heck is an an SBoM anyway and why is it important. A very non-technical comparison would be the list of ingredients in packaged food. Let’s say you are allergic to some food, say […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The difference of course, is that when Taylor’s attorneys call, even Elon Musk takes the call. While no one should be victimized by deep fake porn, Swift has resources to call on that virtually no one else does, so this is only important if it calls attention to the problem. The people most at risk […]
Continue reading →
[DISPLAY_ACURAX_ICONS]