Software Integrity Blog

Author Archive

Taylor Armerding

tarmerding

Taylor Armerding is an award-winning journalist who left the declining field of mainstream newspapers in 2011 to write in the explosively expanding field of information security. He has previously written for CSO Online and the Sophos blog Naked Security. When he’s not writing he hikes, bikes, golfs, and plays bluegrass music. Follow him on Twitter @tarmerding2.


Posts by Taylor Armerding:

 

Why is US infrastructure vulnerable? Its software is vulnerable

We know that cyber attacks can have physical consequences. How does U.S. critical infrastructure fare in terms of cyber security and resilience to attack?

Continue Reading...

Posted in Software Compliance, Quality & Standards | Comments Off on Why is US infrastructure vulnerable? Its software is vulnerable

 

From video games to government: How to steer clear of social engineering scams

Prevent different types of social engineering attacks, targeting everyone from CEOs to gamers to smart appliance users, with the right training and tools.

Continue Reading...

Posted in Data Breach Security | Comments Off on From video games to government: How to steer clear of social engineering scams

 

The journey to better medical device security: Still slow, still bumpy

Medical device security is not keeping up with new threats. Among the reasons: funding, delayed initiatives, and a focus on critical service delivery.

Continue Reading...

Posted in Medical Device Security | Comments Off on The journey to better medical device security: Still slow, still bumpy

 

Consumers, the security of connected toys is pretty much up to you

Connected toys, a hot holiday seller, aren’t all fun and games. What questions should buyers be asking about the security and privacy of connected toys?

Continue Reading...

Posted in IoT Security | Comments Off on Consumers, the security of connected toys is pretty much up to you

 

Mackey: Security isn’t ‘front of mind’ in the IoT

IoT security isn’t keeping pace with the growth in IoT devices. Apparently, this is still news to many users and creators. What can we do to secure the IoT?

Continue Reading...

Posted in IoT Security | Comments Off on Mackey: Security isn’t ‘front of mind’ in the IoT

 

Report: Cyber threats growing, but security responses aren’t keeping pace

A worrying number of companies said they don’t plan to improve their cyber security programs, despite the threats. But all it takes to start is a roadmap.

Continue Reading...

Posted in Software Security Program | Comments Off on Report: Cyber threats growing, but security responses aren’t keeping pace

 

Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

The cost of a data breach is expected to rise owing to GDPR, CCPA, and other privacy regulations. Here’s what the most expensive data breaches cost in 2019.

Continue Reading...

Posted in Data Breach Security, Security Standards and Compliance | Comments Off on Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

 

Biggest 2019 data breaches: Some of the worst of the worst

How do you evaluate the impact of a data breach? Here are six of the biggest data breaches in 2019 in terms of millions, even billions, of people affected.

Continue Reading...

Posted in Data Breach Security | Comments Off on Biggest 2019 data breaches: Some of the worst of the worst

 

The blockchain train: Get on board—with caution

What are the best ways to make enterprise blockchain platforms more secure? Test them, analyze them, and get the bugs out before exposing them to the world.

Continue Reading...

Posted in Application Security | Comments Off on The blockchain train: Get on board—with caution

 

Vandana Verma: Passionate guide for the web application security journey

Vandana Verma, security architect at IBM India Software Labs and web application security expert, shares her advice on tools, training, and shifting left.

Continue Reading...

Posted in Web Application Security | Comments Off on Vandana Verma: Passionate guide for the web application security journey