Software Integrity Blog

Author Archive

Taylor Armerding

tarmerding

Taylor Armerding is an award-winning journalist who left the declining field of mainstream newspapers in 2011 to write in the explosively expanding field of information security. He has previously written for CSO Online and the Sophos blog Naked Security. When he’s not writing he hikes, bikes, golfs, and plays bluegrass music. Follow him on Twitter @tarmerding2.


Posts by Taylor Armerding:

 

More medical mega-breaches thanks to third-party insecurity

The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp.

Continue Reading...

Posted in Data Breach, Healthcare Security, Maturity Model (BSIMM) | Comments Off on More medical mega-breaches thanks to third-party insecurity

 

You’re using open source software, and you need to keep track of it

How should you track open source? It’s almost definitely in your codebase, so the question is not whether to track it but what could happen if you don’t.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis | Comments Off on You’re using open source software, and you need to keep track of it

 

Top 4 website security tips for development and hosting

If you design, develop, or host websites for SMBs, your clients are trusting you to keep their data secure. Here are our top 4 website security tips.

Continue Reading...

Posted in Web Application Security | Comments Off on Top 4 website security tips for development and hosting

 

Ransomware succeeds because targets don’t learn from history

How can organizations prevent ransomware attacks? The Atlanta and Baltimore attacks prove that patch management and employee training should take priority.

Continue Reading...

Posted in General | Comments Off on Ransomware succeeds because targets don’t learn from history

 

It’s not just autonomous cars of the future that need security

The future of secure autonomous vehicles starts today. But the auto industry has to overcome some challenges, like shifting left and building security in.

Continue Reading...

Posted in Automotive Security | Comments Off on It’s not just autonomous cars of the future that need security

 

The cybersecurity workforce executive order: Real potential or wishful thinking?

The cybersecurity executive order of 2019 is meant to boost cyber security skills and improve national defense against growing cyber threats. Will it work?

Continue Reading...

Posted in Security Training | Comments Off on The cybersecurity workforce executive order: Real potential or wishful thinking?

 

Women in tech: Progress but still not parity

We sat down with some women in tech recently to find out what progress the industry’s made in achieving gender balance—and what it could be doing better.

Continue Reading...

Posted in Featured, General | Comments Off on Women in tech: Progress but still not parity

 

Tips for recruiting top cyber security talent (and mistakes to avoid)

The cyber security job market is hot, and common recruiting mistakes can keep new talent away. Here are some do’s and don’ts for cyber security recruiting.

Continue Reading...

Posted in General | Comments Off on Tips for recruiting top cyber security talent (and mistakes to avoid)

 

Is Ireland too soft with GDPR enforcement, or just being prudent?

Some are concerned by the lack of GDPR fines issued by Ireland, the lead regulator for many tech giants. But the country’s taking its time for good reason.

Continue Reading...

Posted in Security Standards and Compliance | Comments Off on Is Ireland too soft with GDPR enforcement, or just being prudent?

 

Don’t let insider threats rain on your cloud deployment

Insider threats in cloud computing are increasing. Reduce your exposure to both malicious and careless insider threats by securing your cloud deployments.

Continue Reading...

Posted in Cloud Security | Comments Off on Don’t let insider threats rain on your cloud deployment