Software Integrity Blog

Author Archive

Taylor Armerding

tarmerding

Taylor Armerding is an award-winning journalist who left the declining field of mainstream newspapers in 2011 to write in the explosively expanding field of information security. He has previously written for CSO Online and the Sophos blog Naked Security. When he’s not writing he hikes, bikes, golfs, and plays bluegrass music. Follow him on Twitter @tarmerding2.


Posts by Taylor Armerding:

 

Cooking up digital privacy, indecent (data) exposure, and just another zero-day

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. What’s in this week’s Security Mashup, you ask? Cook calls for digital privacy laws, user data exposed in the Wife Lovers hack, and just another Windows zero-day. Watch this week’s episode here:

Continue Reading...

Posted in Data Breach, General | Comments Off on Cooking up digital privacy, indecent (data) exposure, and just another zero-day

 

Want to close the software security skills gap? Tanya Janca says start mentoring!

Tanya Janca believes that one of the reasons most connected products are insecure from day one is the software security skills gap that comes from developers not learning security in school. Her solution: Those who know should teach those who don’t. Janca discusses mentoring in the software security industry with us.

Continue Reading...

Posted in General | Comments Off on Want to close the software security skills gap? Tanya Janca says start mentoring!

 

Lance Spitzner: How to secure the human operating system | NCSAM at Synopsys

The original version of this article was published in Forbes.

Continue Reading...

Posted in General | Comments Off on Lance Spitzner: How to secure the human operating system | NCSAM at Synopsys

 

For sale: voter data, ‘unbowed’ by Florence or ransomware, and binding email security

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. What’s in this week’s Security Mashup, you ask? Voter records for sale on the dark web, what the ONWASA ransomware attack says about the state of critical infrastructure security, and the government does DMARC adoption right. Watch this week’s episode here:

Continue Reading...

Posted in General | Comments Off on For sale: voter data, ‘unbowed’ by Florence or ransomware, and binding email security

 

Retail joins the BSIMM—finally

This year’s BSIMM newcomer is retail. The concept of retail software security isn’t new, so why is retail late to the BSIMM party? We’ve got some theories.

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on Retail joins the BSIMM—finally

 

Better passwords in California won’t help much

California is all done with weak passwords.

Continue Reading...

Posted in General, Internet of Things, Security Standards and Compliance | Comments Off on Better passwords in California won’t help much

 

Cyber security: Not just ‘a’ job but many jobs of the future | NCSAM at Synopsys

Cyber security jobs are dynamic, stimulating, and in high demand as cyber threats multiply out of control. What can we do to make sure these jobs are filled?

Continue Reading...

Posted in General | Comments Off on Cyber security: Not just ‘a’ job but many jobs of the future | NCSAM at Synopsys

 

Make your home both smart and secure | NCSAM at Synopsys

The original version of this article was published in Forbes.

Continue Reading...

Posted in Internet of Things | Comments Off on Make your home both smart and secure | NCSAM at Synopsys

 

Remote robbery, an ‘IT incident’ (not a breach?), and face-off on privacy

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. What’s in this week’s Security Mashup, you ask? Remote robbery by Hidden Cobra, a breach by any other name, and facing down the Fourth and Fifth Amendments. Watch this week’s episode here:

Continue Reading...

Posted in General | Comments Off on Remote robbery, an ‘IT incident’ (not a breach?), and face-off on privacy

 

US vows to go on cyber offense

The original version of this article was published in Forbes.

Continue Reading...

Posted in General | Comments Off on US vows to go on cyber offense