With 36 years of experience, Behshad Rejai, VP of engineering in the Software Integrity Group, shares her views of the future of software development.
Continue Reading...
Posted in Agile, CI/CD & DevOps, Application Security, Cloud Security, IoT Security
Code quality and code security aren’t the same, but they’re closely related. And in the current cyberthreat environment, developers should care about both.
Continue Reading...
Posted in IoT Security, Static Analysis (SAST), Web Application Security
The challenges of video surveillance cybersecurity highlight some of the many issues that plague the use of connected devices in physical security systems.
Continue Reading...
Posted in IoT Security
Recent government cybersecurity initiatives assume that the federal government has a role to play in securing the IoT and critical infrastructure. Does it?
Continue Reading...
Posted in IoT Security
Cyber-physical attacks are on the rise. As the IoT creeps further into our daily lives, so does the attack surface. What can we do to keep ourselves safe?
Continue Reading...
Posted in IoT Security
How to prevent IoT hacks: Secure your software before you release it. It’s not that hard. So why aren’t more IoT device manufacturers doing it?
Continue Reading...
Posted in IoT Security
The September GAO cybersecurity report stated that there are about 1,000 outstanding recommendations for automotive, military, and IoT security, among others.
Continue Reading...
Posted in Automotive Cyber Security, IoT Security
The new California password law demonstrates lawmakers’ misunderstanding of how connected devices work, how the internet works, and even how passwords work.
Continue Reading...
Posted in IoT Security, Software Compliance, Quality & Standards
Smart devices are terrifyingly insecure, and industry and government have failed to fix the issue. Here are seven tips to secure your smart home.
Continue Reading...
Posted in IoT Security
The Internet of Things is now inside us. But network-connected medical devices are troubling, considering the history of medical device vulnerabilities.
Continue Reading...
Posted in Healthcare Security & Privacy, IoT Security, Medical Device Security