Software Integrity Blog

Author Archive

Taylor Armerding

tarmerding

Taylor Armerding is an award-winning journalist who left the declining field of mainstream newspapers in 2011 to write in the explosively expanding field of information security. He has previously written for CSO Online and the Sophos blog Naked Security. When he’s not writing he hikes, bikes, golfs, and plays bluegrass music. Follow him on Twitter @tarmerding2.


Posts by Taylor Armerding:

 

Experts: Better IoT security depends on changes in culture, habits

Better IoT security requires a change in consumer culture and habits. But manufacturers should be doing more as well, with better guidance from government.

Continue Reading...

Posted in IoT Security | Comments Off on Experts: Better IoT security depends on changes in culture, habits

 

Want to comply with privacy laws? Start with security

How do you comply with privacy laws that haven’t even been enacted yet? Start by securing your software and systems against cyber attacks and data breach.

Continue Reading...

Posted in Data Breach Security, Software Compliance, Quality & Standards, Software Security Program | Comments Off on Want to comply with privacy laws? Start with security

 

PCI DSS compliance isn’t security, but security can boost compliance

The downward trend in organizations passing PCI DSS interim security testing is worrying. PCI DSS compliance requires security every day, not once a year.

Continue Reading...

Posted in Financial Cyber Security | Comments Off on PCI DSS compliance isn’t security, but security can boost compliance

 

Privacy still eroding on National Data Privacy Day

On National Data Privacy Day, we find little has changed in what numerous privacy advocates and experts have called “the golden age of surveillance.”

Continue Reading...

Posted in Software Compliance, Quality & Standards | Comments Off on Privacy still eroding on National Data Privacy Day

 

Why is US infrastructure vulnerable? Its software is vulnerable

We know that cyber attacks can have physical consequences. How does U.S. critical infrastructure fare in terms of cyber security and resilience to attack?

Continue Reading...

Posted in Software Compliance, Quality & Standards | Comments Off on Why is US infrastructure vulnerable? Its software is vulnerable

 

From video games to government: How to steer clear of social engineering scams

Prevent different types of social engineering attacks, targeting everyone from CEOs to gamers to smart appliance users, with the right training and tools.

Continue Reading...

Posted in Data Breach Security | Comments Off on From video games to government: How to steer clear of social engineering scams

 

The journey to better medical device security: Still slow, still bumpy

Medical device security is not keeping up with new threats. Among the reasons: funding, delayed initiatives, and a focus on critical service delivery.

Continue Reading...

Posted in Medical Device Security | Comments Off on The journey to better medical device security: Still slow, still bumpy

 

Consumers, the security of connected toys is pretty much up to you

Connected toys, a hot holiday seller, aren’t all fun and games. What questions should buyers be asking about the security and privacy of connected toys?

Continue Reading...

Posted in IoT Security | Comments Off on Consumers, the security of connected toys is pretty much up to you

 

Mackey: Security isn’t ‘front of mind’ in the IoT

IoT security isn’t keeping pace with the growth in IoT devices. Apparently, this is still news to many users and creators. What can we do to secure the IoT?

Continue Reading...

Posted in IoT Security | Comments Off on Mackey: Security isn’t ‘front of mind’ in the IoT

 

Report: Cyber threats growing, but security responses aren’t keeping pace

A worrying number of companies said they don’t plan to improve their cyber security programs, despite the threats. But all it takes to start is a roadmap.

Continue Reading...

Posted in Software Security Program | Comments Off on Report: Cyber threats growing, but security responses aren’t keeping pace