Researchers warn that a permission associated with the Google Cloud Build service in Google Cloud can be easily abused by attackers with access to…
Application Security
-
-
More proportionate approach needed to determine product risk levels The second recommendation calls for a more proportionate approach to determining a product’s risk-level, along…
-
The European Commission today finalized its approval of the EU-US Data Privacy Framework, in the latest step in a lengthy effort to harmonize the…
-
Descope Descope is an authentication and user management platform for passwordless authentication. It offers tools for developers to easily add authentication, user management, and authorization…
-
Researchers from software supply chain security firm Rezilion have investigated the security posture of the 50 most popular generative AI projects on GitHub. They…
-
Application SecurityNewsSecurity
CSO Executive Sessions Australia with Australian Institute of Company Directors’ Marco Figueroa
CSO Online | Jun 27, 2023 Marco Figueroa, Senior Manager, Cyber Security, Risk and Compliance, Australian Institute of Company Directors (AICD), joins the show…