Software Integrity Blog

Author Archive

Taylor Armerding

tarmerding

Taylor Armerding is an award-winning journalist who left the declining field of mainstream newspapers in 2011 to write in the explosively expanding field of information security. He has previously written for CSO Online and the Sophos blog Naked Security. When he’s not writing he hikes, bikes, golfs, and plays bluegrass music. Follow him on Twitter @tarmerding2.


Posts by Taylor Armerding:

 

More resources needed to improve connected car security

Connected car security is a priority of the automotive industry, according to a recent report. But the shortage of resources and skills is a challenge.

Continue Reading...

Posted in Automotive Security | Comments Off on More resources needed to improve connected car security

 

The IoT: Still feature rich, security poor

How to prevent IoT hacks: Secure your software before you release it. It’s not that hard. So why aren’t more IoT device manufacturers doing it?

Continue Reading...

Posted in Internet of Things | Comments Off on The IoT: Still feature rich, security poor

 

Study shows security challenges in the auto industry

Automotive cyber security is a high-stakes endeavor, as software vulnerabilities in connected cars can threaten lives. A new report reveals industry concerns.

Continue Reading...

Posted in Automotive Security, Webinars | Comments Off on Study shows security challenges in the auto industry

 

National Data Privacy Day is wishful thinking

The worst data privacy threat today isn’t data breach but data abuse. Organizations are using AI to learn more about us than we’d ever choose to tell them.

Continue Reading...

Posted in Security Standards and Compliance | Comments Off on National Data Privacy Day is wishful thinking

 

The future of open source software: More of everything

The past decade charts the reach of open source into every industry. But what does the future of open source hold? Here are some open source predictions.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security | Comments Off on The future of open source software: More of everything

 

Throwback Thursday: Whatever happened to Stuxnet?

Whatever happened to Stuxnet? Since it destroyed hundreds of centrifuges at a nuclear enrichment facility in Iran in 2010, the worm’s been quiet—but not idle.

Continue Reading...

Posted in General | Comments Off on Throwback Thursday: Whatever happened to Stuxnet?

 

GAO report confirms major gaps in government cybersecurity

The September GAO cybersecurity report stated that there are about 1,000 outstanding recommendations for automotive, military, and IoT security, among others.

Continue Reading...

Posted in Automotive Security, Internet of Things | Comments Off on GAO report confirms major gaps in government cybersecurity

 

Click2Gov breaches show the power of zero-days

Patching issues fast is a step toward software security. But as the Click2Gov breaches show, zero-day vulnerabilities resist even the most persistent patchers.

Continue Reading...

Posted in Data Breach | Comments Off on Click2Gov breaches show the power of zero-days

 

Can we please drive passwords into extinction now?

Passwords are antiquated and insecure. It’s time to eliminate them altogether. Experts from FIDO explain how to enable authentication without passwords.

Continue Reading...

Posted in General | Comments Off on Can we please drive passwords into extinction now?

 

It’s past time to pay much more attention to API security

Organizations manage 363 APIs, on average. But vulnerable APIs can expose your data to anyone who knows how to ask for it. API security starts with the basics.

Continue Reading...

Posted in Web Application Security | Comments Off on It’s past time to pay much more attention to API security