Thursday, April 15, 2021

Guide to Software Risk Assessments and Audits

Veracode: According to researchers, 75 percent of new cyberattacks target the application layer. In addition, 7,000 new software vulnerabilities were discovered in the last year.

This white paper discusses how enterprises can mitigate the risks posed by these software vulnerabilities. It clearly outlines the problem and then offers a four-step process for assessing and mitigating the security risk posed by applications.

Similar articles

Latest Articles

NVIDIA’s New Grace ARM/GPU...

This week is NVIDIA’s GTC, or GPU Technology Conference, and they likely should have changed the name to ATC because this year – it...

What is Data Segmentation?

Definition of Data Segmentation Data segmentation is the process of grouping your data into at least two subsets, although more separations may be necessary on...

The Conversational AI Revolution:...

One of the things I’m looking forward to seeing at next week’s NVIDIA GTC event is an update on their Conversational AI efforts. I’m fascinated...

Edge Computing

Edge computing is a broad term that refers to a highly distributed computing framework that moves compute and storage resources closer to the exact...