Chief Scientist Emeritus Fabian Yamaguchi and foundational Code Property Graph technology recognized with IEEE Test of Time Award
The latest executive order on cybersecurity issued today, Jan 16 2024, covers a lot of ground across multiple cybersecurity domains, from software security to post-quantum cryptography. The White House is sending a clear message to both the public and private sectors that the threats from foreign adversaries are more dire than ever. It comes at […]
READ MOREThe National Cybersecurity Strategy Implementation Plan plays a vital role in safeguarding the digital infrastructure of the nation. This comprehensive plan, outlined by the White House, is comprised of three pillars and sets forth a roadmap to enhance cybersecurity measures across various sectors. Pillar Three of the implementation plan focuses on the need for developers […]
Software engineers’ ideal state includes being able to work with minimal disruption. This “flow state” is when they are most productive and have the best chance of delivering the products and features they are tasked with producing within the required timeline. Whenever something adversely impacts their flow state productivity, mental health, and overall effectiveness may […]
Our customers have repeatedly communicated a desire to deliver secure software without compromising software delivery timelines. At the same time, they have frequently reported that traditional software composition analysis (SCA) tools create an overwhelming number of open-source vulnerability tickets. To quantify the problem, we ran an experiment with a cross-section of our customers. An analysis […]
There has been rapid digital transformation in the healthcare industry in recent years. While this has brought numerous benefits, it has also opened up new avenues for cyber threats and vulnerabilities. One such example is the Medtronic cardiac device security vulnerability, which has prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue an advisory […]
Artificial intelligence (AI) and machine learning (ML) have been in our daily lives for years. Simple examples of their pervasiveness include financial fraud detection, product search optimization, and ad targeting. In cybersecurity, we’ve been applying machine learning to endpoint detection for at least a decade. Other examples include k-means clustering in spam detection and intrusion […]
In the ever-evolving world of cybersecurity, staying informed about the latest threats and trends is crucial. To cater to the growing need for expert insights, we are thrilled to announce the launch of the new Hacking Exposed podcast. Hosted by renowned cybersecurity expert Stuart McClure, this podcast promises to be a treasure trove of knowledge […]
MoveIT Transfer, a widely-used file transfer software, recently suffered a severe vulnerability, triggering a wave of ransomware attacks by criminal groups such as cl0p. The implications of this vulnerability and the subsequent attacks have raised alarm bells across the cybersecurity community. To effectively combat these threats, it is crucial to emphasize the importance of automating […]
Introduction: In the realm of cybersecurity, vulnerabilities can lurk in the most unexpected places, potentially exposing users to significant risks. Recently, a concerning security flaw was discovered in the highly regarded Eaton SecureConnect Security Alarm system, sending shockwaves through the industry. As security researchers, it is our duty to delve into the intricacies of this […]
The Qwiet AI team had a great time this past week at the Gartner Risk Summit. There were a lot of interesting sessions, engaging hallway conversations, and I had an opportunity to talk with folks one on one at our booth about the newly released prioritization options we released alongside our new licensing compliance […]