In Security, Programmers Aren’t Perfect

Posted on April 6th, 2019 by Responsible Cyber

Software developers and their managers must change their perception of secure coding from being an optional feature to being a requirement that is factored into design from the beginning. Fifth in a continuing series about the human element in cybersecurity. Programmers are responsible for developing and releasing new systems and applications, and subsequently announcing vulnerabilities and […]

Read More

Georgia Tech Cyberattack Exposes Data of 1.3 Million People

Posted on April 6th, 2019 by Responsible Cyber

Names, addresses, Social Security numbers, and birth dates may have been pilfered in the attack. Georgia Tech this week revealed that an attacker infiltrated a central database and stole personal information on up to 1.3 million current and former faculty, students, staff, and university applicants.  The unknown attacker or attackers broke in via a Georgia […]

Read More

Financial Firms Scrutinize Third-Party Supplier Risk

Posted on April 6th, 2019 by Responsible Cyber

But executives aren’t confident in the accuracy of cybersecurity assessment data received from their vendors, a new study shows. Financial services executives and managers responsible for the corporate checkbook would rather forgo business with a partner that is not serious about cybersecurity than run the risk of a breach, a new report found. Some 97% […]

Read More

6 Essential Skills Cybersecurity Pros Need to Develop in 2019

Posted on April 6th, 2019 by Responsible Cyber

In a time of disruption in the security and tech worlds, cybersecurity professionals can’t afford to become complacent – even in the face of a skills shortage. 1 of 7 Image Source: Adobe Stock (vchalup) It’s definitely a job seeker’s’ market out there in the cybersecurity employment pool. According to an about-to-be released report from […]

Read More

Major Mobile Financial Apps Harbor Built-in Vulnerabilities

Posted on April 6th, 2019 by Responsible Cyber

A wide variety of financial services companies’ apps suffer from poor programing practices and unshielded data. Mobile apps for financial services are an important part of many consumers’ financial lives, yet those apps are suffering a “vulnerability epidemic,” according to a new report. The report, commissioned by Arxan and produced by the Aite Group, looks […]

Read More

True Cybersecurity Means a Proactive Response

Posted on April 6th, 2019 by Responsible Cyber

Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security. Cybercriminals are always works in progress. Their knowledge and ability to bypass security systems are constantly advancing. As they gain knowledge, they develop and implement sophisticated impersonation methods that are proving increasingly adept at evading detection and gaining access to […]

Read More

How iOS App Permissions Open Holes for Hackers

Posted on April 6th, 2019 by Responsible Cyber

The permissions iOS apps request from users can turn the devices into spy tools and provide a toehold into the enterprise network, according to new research. In many ways, the era of the smartphone is defined by apps, which do everything from sending messages to tracking our exercise. New research shows how Apple iOS apps come […]

Read More

Focus on Business Priorities Exposing Companies to Avoidable Cyber-Risk

Posted on April 6th, 2019 by Responsible Cyber

Despite the growing sophistication of threats and increase compliance requirements, a high percentage of organizations are continuing to compromise their security. A high percentage of organizations are exposed to avoidable cyber-risk because of a persisting tendency to put business interests ahead of safety, a new study by Tanium shows. The security vendor surveyed some 500 […]

Read More

Privacy & Regulatory Considerations in Enterprise Blockchain

Posted on April 6th, 2019 by Responsible Cyber

People who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success. Blockchain, or distributed ledger technology (DLT), is estimated by Gartner to create $3.1 trillion of business value by 2030, yet many organizations lack a clear understanding of its applications, the risks and benefits […]

Read More

Chinese National Carries Malware Into Mar-a-Lago

Posted on April 6th, 2019 by Responsible Cyber

A Chinese woman arrested for entering the grounds of Mar-a-Lago under false pretenses was carrying electronic equipment holding malware. Chinese national Yujing Zhang was arrested for breaching the perimeter at the Mar-a-Lago golf club in Florida and telling the US Secret Service she was there to attend a nonexistent event. While the details of her […]

Read More