mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

573
comptes actifs

#softwaresecurity

0 message0 participant0 message aujourd’hui

alojapan.com/1319318/japan-cyb Japan Cyber Security Market Trends Analysis Report #ITSecurity #Japan #JapanNews #news #ResearchAndMarkets #SecurityOrchestration #SecurityTechnologies #SecurityTechnology #SoftwareSecurity #UnifiedThreatManagement Dublin, July 11, 2025 (GLOBE NEWSWIRE) — The “Japan Cyber Security Market Size, Share & Trends Analysis Report by Component (Hardware, Software), Security Type, Solution Type, Deployment, Organization Size, End-use, Approach, with

⚠️ The EU 🇪🇺 to launch its own vulnerability database because the US is dropping the ball 🇺🇸 😢 — and the timing couldn’t be more telling 🛡️

In response to growing digital sovereignty concerns, NIS2 compliance, and calls for vendor accountability, the EU is building a public vulnerability catalog. The goal?
📂 Track and disclose security bugs across government, industry, and open source
🔍 Complement—not compete with—the CVE Program
📊 Increase trust, transparency, and resilience within the bloc

But let’s be honest:
🤝 Multiple public vuln databases means we must align identifiers, disclosure standards, and data feeds—or risk fragmentation
💡 Transparency is great, but what about verification, consistency, and maintenance?
📉 And if vendors or agencies self-report, how do we ensure accuracy or prevent omission?

Done right, this could increase pressure on lagging suppliers and elevate accountability. But if we don’t connect the dots globally, we may just multiply confusion.

What do you think: smart evolution or coordination nightmare?

#CyberSecurity #VulnerabilityManagement #EU #CVE #NIS2 #SoftwareSecurity #Governance #security #privacy #cloud #infosec
theregister.com/2025/05/13/eu_

The Register · As US vuln-tracking falters, EU enters with its own security bug databasePar Jessica Lyons

🎙️ Going Live in 15 Minutes — Come Join Us!

I’m about to tune in for a live ITSPmagazine webinar that dives into a topic I truly care about:

Secure Coding = Developer Empowerment

It’s not just about reducing risk — it’s about investing in developers, boosting velocity, and building better software from the start.

🗓️ Today – April 18

🎙️ Hosted by ITSPmagazine

💡 In partnership with Manicode Security

Jim Manico

Jimmy Mesta 🤙

Sean Martin, CISSP

Will be talking about:

✅ Why most developers never get proper secure coding training

✅ How to get leadership buy-in for better dev security

✅ Why this isn’t just security—it’s a career boost

If you’ve got time, join us live. If not, watch it on demand. Either way, it’s a conversation worth having.

👉 Join here:

crowdcast.io/c/secure-coding-e

#ApplicationSecurity, #DeveloperEmpowerment, #SecureCoding, #DevSecOps, #softwaresecurity, #cybersecurity, #infosec, #ITSPmagazine

crowdcastSecure Coding = Developer Power — An ITSPmagazine Webinar with Manicode SecurityRegister now for Secure Coding = Developer Power — An ITSPmagazine Webinar with Manicode Security on crowdcast, scheduled to go live on April 16, 2025, 03:30 PM EDT.

Yes, it is true! 😏
🎙️💻 It's Webinar Time!

... and we’re back with another ITSPmagazine Thought Leadership Webinar — because impactful conversations and meaningful perspective exchanges are what we’re all about.

🚀 After the success of our debut session “AI In Healthcare: Who Benefits, Who Pays, And Who’s At Risk?” (missed it? Watch it on demand 👉 crowdcast.io/c/ai-in-healthcar) —we’re diving back in with a brand-new conversation focused on the heart of what drives our work: cybersecurity, technology, and society.

💡 Secure Coding = Developer Power: How To Convince Your Boss To Invest In You An ITSPmagazine Webinar With Manicode Security 🗓️ April 16, 2025

We’re honored to welcome two brilliant minds joining Sean Martin, CISSP — yes, of course, he’s pretty sharp too 😬 — for this one:

🎙️💥 Jim Manico, Founder and Secure Coding Educator at Manicode Security
🎙️💥 Jimmy Mesta 🤙, Course Instructor for Manicode and CTO at RAD Security

Why does #securecoding still feel like an afterthought? This session tackles that question head-on—covering why most companies don’t invest in secure coding training, how developers can advocate for themselves, and how this skillset can seriously boost your career. We’ll even get into some live code reviews and automation demos you won’t want to miss.

🔐💥 Secure Coding = Developer Power: How To Convince Your Boss To Invest In You
🗓️💥 LIVE: April 16, 2025
📍💥 REGISTER HERE: crowdcast.io/c/secure-coding-e

Be sure to share this with your fellow #developers, coworkers, and anyone who cares about building safer software and smarter teams. This is your chance to invest in yourself—and help your company do the same.

LET'S go, we can do this!!! 🤘😬✨

#webinar, #securecoding, #developerlife, #cybersecurity, #infosec, #softwaresecurity, #devsecops, #itspmagazine #infosecurity #tech #technology #software #programmers

It’s always a great pleasure to spend time with Jim Manico and learn from his expertise! 🧐✨📚

Turning #Developers into #Security Champions: The Business Case for Secure Development | A Manicode Security Brand Story with Jim Manico

In this insightful episode, hosted by @seanmartin and @Marcociappelli on @ITSPmagazine, Jim shares how enabling developers to embrace secure coding practices can elevate them into true security champions.

He explains why secure development isn’t just about writing safer code—it’s a transformative approach that strengthens #business resilience, protects critical data, and fosters a company-wide culture of security-first thinking.

📺 Watch the full episode here:
youtu.be/OJXD_cS1JJM?si=KGwqwm

🎧Listen and subscribe here:
brand-stories-podcast.simpleca

Follow this link to listen, watch, or read the episode—whichever works best for you.

📚 itspmagazine.com/their-stories

🚀 New Blog Post Alert! 🛠️

I just published "Enabling Gradle Dependency Verification: A Practical Guide"! 🎯

🔒 Secure your software supply chain
✅ Verify dependencies with PGP signatures & checksums
⚡ Automate updates with confidence

Read more on how we implemented this for the GradleX organization and why it matters!

👉 britter.dev/blog/2025/02/10/gr

britter.devEnabling Gradle Dependency Verification: A Practical GuideDependency verification is a crucial aspect of maintaining the integrity and security of your software projects. This blog post gives a detailed breakdown of the process that leads to a streamlined and maintainable verification setup.
A répondu dans un fil de discussion

@BradRubenstein wrote:
«
The near absence of civil liability for the consequences of software security failure is really the root of this mess.
»

I disagree. IMO the root cause is greed (money or being liked).

Civil liability, or the lack thereof, is not a cause but may provide a *partial* fix.

Only partial because anonimity and inpersonation flourish on the internet (because of greed).

As I wrote yesterday (in Dutch: [1]), Pavel Durov gets arrested for allowing criminals to hide, while big tech, such as Cloudflare, gets away with it.

See, for example, arstechnica.com/security/2024/ or virustotal.com/gui/ip-address/ (and tap ••• a couple of times).

Or other big tech, like Google (bleepingcomputer.com/news/secu).

[1] infosec.exchange/@ErikvanStrat

Ars Technica · Cloudflare once again comes under pressure for enabling abusive sitesCloudflare masks the origin of roughly 10% of abusive domains, watchdog says.

"🔒 When Antivirus Turns Foe: The Shadowy Flipside of AV Software 🔒"

In an enlightening piece by Alejandro Hernández (@s1kr10s on Twitter), a deep dive into the paradoxical world of antivirus (AV) software reveals a concerning trend. Originally designed as cybersecurity guardians, some AV solutions have morphed into vulnerabilities themselves, exposing users to potential threats. The article dissects cases where AV software, instead of acting as a robust security layer, becomes an exploitable loophole for attackers. 🛡️💻🔓

The technical analysis provided highlights how some AV products might execute arbitrary code or misuse their elevated privileges, turning a system's defense mechanism into its Achilles' heel. It calls for a reevaluation of trust placed in these tools and emphasizes the necessity for ongoing vigilance and security hygiene.

Tags: #CyberSecurity #Antivirus #Vulnerability #InfoSec #SoftwareSecurity #ThreatIntelligence 🌍🔐

Source: Medium - Alejandro Hernández

Medium · AV — When a Friend Becomes an Enemy — (CVE-2024–23940)Par Miguel Méndez Z.
We at the NSA would like to express our sincere frustration with the rising popularity of Rust. As a government agency that thrives on finding vulnerabilities and exploits in software, we can't help but feel discouraged by the language's memory safety and concurrency features.

Gone are the days where we could easily exploit null pointer errors and race conditions in C++ code. Rust has made it nearly impossible for us to find these types of vulnerabilities, leaving us with less and less to work with.

We understand that this may be good news for the software industry and its users, but it's a real blow to our mission here at the NSA. We can only hope that the next programming language trend will be less security-focused, so we can get back to our old tricks.

In all seriousness, we do recognize the importance of secure software and applaud the efforts of the Rust community in promoting safe coding practices. We may have to find new ways to approach our work, but ultimately, a more secure digital world benefits everyone.

#RustLang #SecureCoding #SoftwareSecurity #NSA #ProgrammingLanguages #MemorySafety #Concurrency #Exploits #Vulnerabilities #DigitalSecurity #CyberSecurity