Software Integrity

Archive for the 'Blockchain Security' Category

 

OpsSight Container Security 2.0, Integrating SAST into DevSecOps, building hacker-proof voting

Black Duck by Synopsys announces OpsSight 2.0. Abbott strengthens pacemaker software against vulnerabilities. A year after disclosure, the Struts vulnerability is still a danger to thousands of companies. And the new Synopsys Security Mashup video is up. Software Integrity Insight is your resource on the cyber security and open source security news that made headlines […]

Continue Reading...

Posted in Application Security, Blockchain Security, Containers, DevOps, Medical Device Security, Static Analysis (SAST) | Comments Off on OpsSight Container Security 2.0, Integrating SAST into DevSecOps, building hacker-proof voting

 

Employees post passwords online, Hacking tool grants access to DVRs, and Blockchain

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Weekly Security Mashup episode. When employees post passwords online via Brian Krebs, security blogger – Krebsonsecurity.com – Hosts of companies using the online collaboration tool Trello.com share passwords for sensitive internal resources. New hacking tool lets […]

Continue Reading...

Posted in Application Security, Blockchain Security, Data Breach | Comments Off on Employees post passwords online, Hacking tool grants access to DVRs, and Blockchain

 

What’s in your containers?, Spring Break vulnerability, cyber security in healthcare

Open Source Insight makes the transition to the Synopsys Software Integrity (SIG) blog this week, and you can find us here, as well as the latest posts from SIG technology evangelist Tim Mackey. This week’s edition looks at security for container images, cyber security in healthcare, how most data breaches occur, and a host of […]

Continue Reading...

Posted in Blockchain Security, Containers, Data Breach, Healthcare Security, Open Source Security | Comments Off on What’s in your containers?, Spring Break vulnerability, cyber security in healthcare

 

Regulation looming for cryptocurrency

The cryptocurrency industry is both beloved and feared for being the so-called Wild West of finance. Beloved because of minimal regulation and at least a measure of anonymity. Feared because of minimal protection. There is no Federal Reserve to set a value, no FDIC to guarantee at least a portion of what you have stored […]

Continue Reading...

Posted in Blockchain Security, Financial Services Security | Comments Off on Regulation looming for cryptocurrency

 

IMF wants to pierce the blockchain anonymity veil

Anonymity—one of the biggest draws of cryptocurrency and the blockchain infrastructure it depends on—could get turned on its head if the vision of the head of the International Monetary Fund (IMF) comes true. Christine Lagarde, managing director of the IMF, called in a recent blog post for more regulation of the cryptocurrency market—to include the […]

Continue Reading...

Posted in Blockchain Security, Financial Services Security | Comments Off on IMF wants to pierce the blockchain anonymity veil

 

How can blockchain applications adapt and adopt software security best practices?

Though blockchain-native software is in its infancy, the technology races forward to meet more and more use cases. But the community doesn’t seem to have taken software security principles seriously, as we can see from the recent scan of Ethereum smart contracts that identified 34,200 vulnerable contracts. For added perspective, a smart contract is a […]

Continue Reading...

Posted in Application Security, Blockchain Security, Software Security Testing | Comments Off on How can blockchain applications adapt and adopt software security best practices?

 

Blockchain security and the cryptocurrency boom, Part 2: Application

In Part 1 of our article on blockchain security and cryptocurrency, we took a hard look at the core components that make up a successful cryptocurrency like Bitcoin. From the distributed network itself to the individuals who wish to own and use a cryptocurrency wallet to transfer or spend Bitcoin, security is key (pun intended) […]

Continue Reading...

Posted in Blockchain Security, Cryptography, Software Security Testing, Vulnerability Assessment | Comments Off on Blockchain security and the cryptocurrency boom, Part 2: Application

 

Blockchain security and the cryptocurrency boom, Part 1: Theory

Thanks to Bitcoin, it’s fair to say that “blockchain” is a buzzword at the moment—like DevOps, or Zumba. This article isn’t going to dive into what a blockchain is, because many others out there already do that. Here’s a pretty good one that has a snappy description of the evolution of Bitcoin and its symbiotic […]

Continue Reading...

Posted in Blockchain Security, Cryptography, Software Security Testing, Vulnerability Assessment | Comments Off on Blockchain security and the cryptocurrency boom, Part 1: Theory

 

Former Google engineer launches BlockChain-enabled OS for financial services

A former Google engineer has created an operating system for the financial service industry that uses blockchain, a component developed by BitCoin. Known as Vault OS, the operating system creates a shared database in which participants can trace every transaction ever made. The ledger used is both tamper-proof and transparent. That means transactions can be […]

Continue Reading...

Posted in Blockchain Security, Financial Services Security | Comments Off on Former Google engineer launches BlockChain-enabled OS for financial services