The Department of Homeland Security released a dictionary of software weaknesses and their associated mitigation practices yesterday. The guide, titled Common Weakness Enumeration version 2.0, was ...
In the beginning, we identified two major types of software supply chain attacks and nine minor types. The world keeps insisting on a broader definition. In the spring of 2020, it really mattered to ...
The National Institute of Standards and Technology (NIST) recently released an official definition of what the federal government will regard as “critical software,” — a key, early stage step to ...
Sun's president Jonathan Schwartz has angered some in the free software community by appearing to misrepresent what open source is. In Schwartz's opening keynote at the JavaOne conference on Monday he ...
The goal is to enable stronger security practices for government-purchased software mandated by President Biden's cybersecurity executive order. The EO stipulates that NIST’s definition “shall reflect ...
As enterprises move toward understanding and incorporating AI in not only their products and services but how they operate to bring these new, more powerful experiences to market, they will be ...
[This article was originally published in the January 2015 issue of National Defense, the National Defense Industrial Association's business and technology magazine, under the title, "Know When ...
With the European Commission heading towards a second reading of its patent legislation, there's still more heat than light in discussions on the subject. The UK Patent Office (UKPO) has of late been ...
An approach to designing and operating large-scale networks that is based on programming the forwarding decisions in routers and switches via software from a central server. Software-defined ...
Software-defined storage is quickly catching on as a top technology trend in the storage industry, but the exact meaning of the term, and indeed whether it represents a new paradigm or just another ...