Software Integrity Blog

Author Archive

Taylor Armerding

tarmerding

Taylor Armerding is an award-winning journalist who left the declining field of mainstream newspapers in 2011 to write in the explosively expanding field of information security. He has previously written for CSO Online and the Sophos blog Naked Security. When he’s not writing he hikes, bikes, golfs, and plays bluegrass music. Follow him on Twitter @tarmerding2.


Posts by Taylor Armerding:

 

Financial services cybersecurity still porous: Report

A new financial services cybersecurity report reveals an industry aware of online threats but not doing enough to protect its systems, networks and data.

Continue Reading...

Posted in Financial Services Security | Comments Off on Financial services cybersecurity still porous: Report

 

Report: Financial services can do cyber security better with the right tools

The financial services industry is falling behind in cyber security. A new report shows where organizations should focus their software security efforts.

Continue Reading...

Posted in Featured, Financial Services Security | Comments Off on Report: Financial services can do cyber security better with the right tools

 

Apollo 11 software lessons still relevant today

What did Apollo 11 teach us about software development? Coding practices have changed since 1969, but the lessons learned from the moon mission still hold.

Continue Reading...

Posted in General | Comments Off on Apollo 11 software lessons still relevant today

 

Ransomware versus cities: Sowing chaos as well as cost

Ransomware attacks on cities are on the rise. The latest ransomware attacks of 2019 suggest that international organized criminals are behind the epidemic.

Continue Reading...

Posted in General | Comments Off on Ransomware versus cities: Sowing chaos as well as cost

 

Securing software development: NIST joins the parade

The NIST Secure Software Development Framework (SSDF) is the latest standard aimed at improving software security. Can its novel approach help it succeed?

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on Securing software development: NIST joins the parade

 

Why hackers are targeting your web apps (and how to stop them)

How do you protect your web apps from hackers? Forget firewalls. You need an AppSec toolbelt, including software composition analysis and automated testing.

Continue Reading...

Posted in Web Application Security | Comments Off on Why hackers are targeting your web apps (and how to stop them)

 

Get ready for a ransomware tsunami

Ransomware payments might seem like a quick solution to get back on your feet after an attack. But paying the attackers just makes the problem worse.

Continue Reading...

Posted in General | Comments Off on Get ready for a ransomware tsunami

 

Patch now or pay later: Report

To prevent data breaches, practice these two fundamentals: shift left (perform application security testing early and often in your SDLC), and always patch.

Continue Reading...

Posted in Data Breach | Comments Off on Patch now or pay later: Report

 

It’s not just you they’re after—it’s your supply chain too

Supply chain attacks are not new. But as the supply chain grows longer and more complex, the attacks are evolving to keep up. Is your supply chain secure?

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on It’s not just you they’re after—it’s your supply chain too

 

More medical mega-breaches thanks to third-party insecurity

The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp.

Continue Reading...

Posted in Data Breach, Healthcare Security, Maturity Model (BSIMM) | Comments Off on More medical mega-breaches thanks to third-party insecurity