Dror Arie, Head of Engineering @ GlobalDots
24.07.2020
image 1 Min read

According to new research, a rising rate of coronavirus infections has been met with a declining rate of reported cybersecurity breaches. The finding, from the Identity Theft Resource Center (ITRC), shows that publicly reported US data breaches dropped 33% in the first half of 2020 compared with the first half of 2019.

The ITRC sees significant drops in two of the three primary sources of breaches: Insider threats and third-party contractors have seen substantially lower numbers, while those from external threat actors are down but by a smaller margin.

The number of publicly reported breaches in 2020 is on track to be the fewest since 2015, says the ITRC, which also cautions it expects numbers to rise once again when the pandemic has run its course.

Read more: Dark Reading

Learn More

slider item
Open Source & Code Security
Dror Arie, Head of Engineering @ GlobalDots 31.05.21

Open source projects are the embodiment of the core philosophy: ‘free internet and technology for everyone around the globe’. They can be created, changed and distributed to anyone by anyone and for any purpose. Contributing to an open source projects is an endorsement of this philosophy, that promotes digital literacy in technological and non-technological communities. […]

Read more
slider item
Open Source & Code Security
Dror Arie, Head of Engineering @ GlobalDots 31.05.21

The recent SolarWinds breach highlights a new paradigm in the Software Supply Chain. When compared simply to the code itself without any additional tools, Proprietary Code is no more secure than Open Source. By contrast, many would argue that Open Source Code is more secure due to a faster fix/patch/update cycle and the pervasive access to source […]

Read more
slider item
Open Source & Code Security
Dror Arie, Head of Engineering @ GlobalDots 31.05.21

Have you shifted left yet? That’s the big trend, isn’t it? It’s meant to signal a movement of security responsibilities, moving from central IT teams over to developers, but that’s trickier than it sounds. Simply taking tools that are intended for use by security experts and making them run earlier in the supply chain does not […]

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Book a Demo