Microsoft is to expand its bug bounty scheme to reward people for finding high-risk security vulnerabilities that could impact the security of Microsoft’s online services. The company is extending its ...
BlueVoyant, a leader in integrated cybersecurity, is launching its Software Bill of Materials (SBOM) management offering, helping organizations reduce risk related to software by automating the ...
The continuing surge in third-party data breaches underscores the profound cybersecurity vulnerabilities present in vendor supply chains. Case in point, Black Kite’s 2024 Third-Party Breach Report ...
On October 21, 2025, the New York State Department of Financial Services (NYDFS) released comprehensive guidance for registrants regarding management of cybersecurity risks associated with third-party ...
Enterprises want access to new software and AI tools but can’t risk sending their sensitive data out to a third-party software-as-a-service (SaaS) providers. Tensor9 looks to help software companies ...
In 1965, Ralph Nader’s groundbreaking book Unsafe at Any Speed exposed how car manufacturers prioritised style, performance, and profit over the safety of drivers and passengers. His narrative spurred ...
Google has taken a massive step towards fixing the animation issues that have plagued third-party launchers on Pixel phones for years. The fixes are currently rolling out as part of the March 2025 ...
Assessing the risks of working with third-party vendors is nothing new for CISOs, but it has recently become an area of renewed focus. Increasing use of third-party software inside organizations and ...
Increasingly complex business partnerships and rising reliance on third-party software components are proving to be ever weakening cybersecurity links. Many enterprises are at growing risk due to ...