Secure Code Reviews (bringing someone in from outside of the team to review/audit the code for security vulnerabilities) and application Pen Tests (again, bringing a security specialist in from outside the team to test the system) are both important practices in a secure software development program.
Author: ISBuzz Team
Dropbox has recently revised its claims on how securely they maintain user data, prompting a lawsuit claiming that Dropbox has misled its customers about its privacy policy and encryption processes.
While technology has been at the forefront of the news lately, with foreign surveillance programs being identified for monitoring UK phone calls and internet data and space robots discovering historical proof of water on Mars, most of this news has been around how technology helps create histories – either of data or physical changes.
Reporting on data breaches is important to keep readers up to date with healthcare data breaches as means to keep all of the stakeholders involved – healthcare organizations, vendors and patients – informed.
It may seem strange to say, but there are probably a lot of people involved in IT security who long for the “good old days” when the threats were limited to computer viruses getting downloaded through email and hackers trying to break through a firewall.
Is the tech ‘language barrier’ getting in the way of your job?
News that the US National Security Agency (NSA) and Federal Bureau of Investigation, tapping into the servers of Internet giants has exposed the US government’s double standards in gathering online data, cyber security analysts have said.
Joe Public received a double ‘slap-to-the-face’ in light of the news that Glasgow City Council has been fined £150,000 for losing two unencrypted laptops, according to Simon Bain, CTO of Simplexo.
China is developing its own software and building its own infrastructure to create a tech industry, says a top computer scientist at the DOE’s Argonne National Laboratory.
Last week, Denmark’s national police revealed that, in the summer of 2012, hackers might have stolen and modified information from the police driving license register, including the personal identity number register (CPR).