Article: Improving Open-source Software Security for Java Developers

Open Source, Software

Improving Open-source Software Security for Java Developers

Whether it be next-generation supply chain attacks like the Codecov incident or social engineering attempts to deliberately introduce vulnerabilities in the Linux kernel code, threats against developers are consistently evolving and come from least expected places.

The introduction of vulnerable code in an upstream repository or a published release – whether intentional or not, can threaten the security of the wider software supply chain, especially for open-source components that are trusted and consumed by thousands.

Therefore, introducing automatic pre-flight security checks before a component enters the distribution stage can help spread awareness among software publishers and highlight insights that might have otherwise been missed.

Bringing awareness to security issues lurking in applications in this way safeguards the wider software supply chain from known bugs and vulnerable dependencies.

Read full article

Article: Blockchain Comes Under Data Privacy Scrutiny

Blockchain, Cyber-Security, Data

Blockchain Comes Under Data Privacy Scrutiny

Blockchain will increasingly change how businesses operate in various industries and sectors, but this disruptive technology will undoubtedly continue to face legal and regulatory challenges as it becomes more widely accepted.

Smart contracts and DApps, in particular, will face an increase in legal scrutiny as the Federal and state government begin to establish legal standards. Blockchain, as a whole, will likely experience an added level of scrutiny as states around the US establish their own state data privacy laws like California (CCPA) and Virginia.

Read full article

Robert James Beckett: Tim Berners-Lee on Next Big Step – Social Media with a Heart Giving Us Time to Think

Advanced Cyber I/O
Robert James Beckett

We need a social media with heart that gives us time to think | Will Hutton

As even Tim Berners-Lee has recognised, the volume of data with which we’re being bombarded prevents us from engaging in genuine debate

On average, we check our smartphones 200 times a day – for emails, alerts, tweets or text messages. That’s before using any one of our phone’s multiple applications. It is a degree of connectivity to one another, and the world beyond, that is unparalleled. And it’s difficult to imagine life without it – to be so connected is to have access to instant knowledge, instant exchange, instant laughter and anger.

Read full article

See Especially:

Robert James Beckett @ Phi Beta Iota

Tim Berners-Lee @ Phi Beta Iota

See Also:

The Future: Recent “Core” Work by Robert Steele