Remove tag national-security
article thumbnail

SBOMs: Securing the Software Supply Chain

eSecurity Planet

Threat intelligence can help scan IT environments for the latest malware, but that’s just one security layer against zero-day threats. There is no such thing as an ironclad risk-averse software management strategy; therefore, organizations must strive to be risk-aware. Also read: How to Defend Common IT Security Vulnerabilities.

Security 133
article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Vamosi: But as someone who wrote a book questioning the security of our mass produced IoT devices, I wonder why no one bothered to test and certify these devices before they were installed? I mean, on the one hand, we're saying it's a national priority. And on the other hand, we're saying security, that's a secondary concern.