Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Sophos CISO on Software Flaws, Vendor Risk and Secure by Design
Cyber Security

Sophos CISO on Software Flaws, Vendor Risk and Secure by Design

Team-CWDBy Team-CWDFebruary 4, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


In this Infosecurity interview, we speak with Sophos CISO Ross McKerchar about one of the biggest topics dominating cybersecurity headlines today, software vulnerabilities.

With flaws driving some of the most significant breaches in recent years, Ross highlights why these issues remain so widespread and how both enterprises and cybersecurity vendors themselves must take a more proactive role.

We dig into the rise of Secure by Design frameworks, what meaningful adoption really looks like and why security providers need to be especially mindful of their own development practices.

In conversation with Infosecurity, Ross shares insights into:

  • How CISOs can raise the bar by shifting from binary ‘did they have a vulnerability’ thinking to evaluating how vendors actually operate
  • Why the presence of issues doesn’t automatically mean a vendor is insecure and why its important to realise the ones disclosing and fixing vulnerabilities are often the most responsible
  • How Secure by Design frameworks help both CISOs and engineers work together and provide direction for the development of more secure software products

Watch now to learn how to protect your organization implement strategies to avoid falling victim to this risk.

Resources:

Watch more: Inside North Korea’s IT Worker Scam: Sophos CISO Shares How to Stay Protected



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleParis Prosecutors Raid Elon Musk’s X Offices in France
Next Article From Triage to Threat Hunts: How AI Accelerates SecOps
Team-CWD
  • Website

Related Posts

Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Cyber Security

SQL Injection Flaw Affects 40,000 WordPress Sites

February 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What’s at stake if your employees post too much online

December 1, 2025

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

Your information is on the dark web. What happens next?

January 13, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.