I am in the middle of another IT and Cyber Security audit for an organisation and as part of that report I have been asked to look at their SharePoint configuration. IT was set up in rush during the first lockdown and the board and CEO are not sure about …
Supply chain vulnerability
We have many clients who have their own software or have custom software on their website or web apps written for them by developers. These developers may or may not reuse code or modules written by third party developers and sourced through a software repository – such as GitHub or …
Two stories about GitHub
GitHub is a code development environment and code repository used around the world by many software developers and well known applications. Consequently it is also a prime target for threat actors who if they can get inside the development of packages can infect many unsuspecting users. The collaboration tool Slack …
Is you car on this list? Mine is.
My other car is not a Porche – but car wireless security (or lack of it) is something we all need to be aware of: Ferrari, BMW, Rolls Royce, Porsche and more fix vulnerabilities giving car takeover capabilities – The Record by Recorded Future I will continue to use my …
Software supply chain weaknesses
Software and code repositories are a great resource for web and software developers – they save time, client’s money and get quality modules for their projects. GitHub is one of the most popular – with many major software players using it to develop their code and other developers, large and …