Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2022

BYOD in the workforce: MDM and MAM with Microsoft Intune

Mobile device management and mobile application management are critical to securing your organization’s data and IoT devices. According to recent research, the average household has 25 connected devices, an increase from 11 in 2019. This widespread adoption, along with a global pandemic, has changed the way we operate and communicate, both personally and professionally.

CyRC Vulnerability Analysis: Two distinct Spring vulnerabilities discovered - Spring4Shell and CVE-2022-22963

Two vulnerabilities affecting different Spring projects were identified this week. Here’s what you need to know about Spring4Shell and CVE-2022-22963. The Internet is buzzing with talk about two separate vulnerabilities related to different Spring projects. The two are not related, but have been confused because both vulnerabilities were disclosed at nearly the same time.

How to cybersecurity: Software supply chain security is much bigger than you think

Managing the risks of your software supply chain requires more than a basic understanding of the software components that make up your applications. My wife and I have four children, which means we’ve done a ton of shopping at Costco over the years. First it was diapers, then cereal, then every other kind of food, all of which provided significant savings for our family of six.

What is a software bill of materials?

With a software Bill of Materials (SBOM), you can respond quickly to the security, license, and operational risks that come with open source use. A software Bill of Materials (SBOM) is a list of all the open source and third-party components present in a codebase. An SBOM also lists the licenses that govern those components, the versions of the components used in the codebase, and their patch status, which allows security teams to quickly identify any associated security or license risks.

NIST provides recommended criteria for cybersecurity labeling for consumer software and IoT products

Will NIST’s cybersecurity labeling for consumer software and IoT products help us achieve better security? Our experts weigh in. If one of the goals of President Biden’s May 2021 “Executive Order on Improving the Nation’s Cybersecurity” is fulfilled, you’ll be able to look for a quality and security assurance label on any software product you consider buying.

Synopsys contributes to the Linux Foundation Census II of the most widely used open source application libraries

Census II examines the most popular components of free and open source software and highlights the issues affecting the security of these libraries. Last week, the nonprofit Linux Foundation and Harvard’s Lab for Innovation Science published Census II of Free and Open Source Software—Application Libraries. This report identifies more than 1,000 of the most widely deployed open source application libraries.