Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Controlling The Risks Of Vulnerable Application Libraries

A posting from Dark Reading in there Application Security section: During the past decade, developers have increasingly leaned on third-party components, such as open-source libraries, to dramatically lighten the load during coding. These components can help reduce time spent adding basic or universal features and functions so that developers can focus their work on the innovative […]

New Focus On Risk, Threat Intelligence Breathes New Life Into GRC Strategies

A posting Dark Reading in the Risk Management  section: A growing need for security discipline and the availability of better threat data are changing the old, monolithic Governance, Risk and Compliance concept into a near-term enterprise risk management project, experts say. GRC, a methodology for building global IT policies, priorities and practices around key risk and […]

Controlling The Risks Of Vulnerable Application Libraries

A posting from Dark Reading in there Application Security section: During the past decade, developers have increasingly leaned on third-party components, such as open-source libraries, to dramatically lighten the load during coding. These components can help reduce time spent adding basic or universal features and functions so that developers can focus their work on the innovative […]

New Focus On Risk, Threat Intelligence Breathes New Life Into GRC Strategies

A posting Dark Reading in the Risk Management  section: A growing need for security discipline and the availability of better threat data are changing the old, monolithic Governance, Risk and Compliance concept into a near-term enterprise risk management project, experts say. GRC, a methodology for building global IT policies, priorities and practices around key risk and […]