Robert LemosinREADME_Attackers are on the edge. Where are defenders?Network “edge” devices have become a common entry point for attackers in significant enterprise breaches. How can defenders respond?Jul 18, 2023Jul 18, 2023
Robert LemosinREADME_As APIs proliferate, attackers followWith APIs accounting for more than half of all internet traffic, attacks on mobile and web application endpoints continue to grow.Jun 13, 2023Jun 13, 2023
Robert LemosinREADME_How defenders are experimenting with artificial intelligenceAI dominated conversations at RSA in May, but underneath the hype, real changes are in the works.May 30, 2023May 30, 2023
Robert LemosinREADME_Home is where the hackers are: The dizzying task of securing remote workIncreases in phishing attacks, credential stuffing against corporate cloud services and vulnerabilities in consumer hardware abound.May 9, 2023May 9, 2023
Robert LemosinREADME_Flawed choices: Developers continue to use vulnerable open-source dependenciesWhile the open-source ecosystem continues to make progress on securing the production of widely used components, devs still need more.Apr 17, 2023Apr 17, 2023
Robert LemosinREADME_Russia-Ukraine cyber conflict splits APT groups, raises threat levelThe global cyberthreat landscape has changed since Russia’s invasion of Ukraine but not necessarily in the ways predicted.Mar 10, 2023Mar 10, 2023
Robert LemosinREADME_AI code assistants need security trainingMultiple studies have found that generative neural networks that produce code also reproduce security vulnerabilities in their datasets.Feb 3, 2023Feb 3, 2023
Robert LemosinREADME_SBOMs are billed as a balm for supply chain risks. What’s the holdup?Log4Shell accelerated efforts to require a software bill of materials for the apps we rely on, but that’s easier said than done.Dec 1, 2022Dec 1, 2022
Robert LemosinREADME_Ghosts of Log4j: Open-source vulnerabilities confound software developersMost of the code in typical applications comes from open-source projects, importing dozens — and often, hundreds — of components created…May 8, 2022May 8, 2022
Robert LemosYou should, at the very least, cite your source when you copy code samples.Aug 14, 2020Aug 14, 2020