/ Security Assessments News /

Collin Mulliner Developing and maintaining secure firmware for tablets, cars, and IoT devices is hard. Often, the firmware is initially developed by a third party rather than in-house. And it can be tough as projects move from inception and prototyping to full-force engineering and finally to deployment and production. Now, an engineer at self-driving car …

By adhering to cybersecurity best practices, election organizations—including state, local, tribal, and territorial (SLTT) governments—can improve the security of their election systems. The Cybersecurity and Infrastructure Security Agency (CISA) Hunt and Incident Response Team (HIRT) developed the best practices in this tip from lessons learned through engagements with SLTT governments, election stakeholders, and others. Organizations …

/ Government Security Alerts /

What is enterprise network security? Enterprise network security is the protection of a network that connects systems, mainframes, and devices―like smartphones and tablets―within an enterprise. Companies, universities, governments, and other entities use enterprise networks to help connect their users to information and people. As networks grow in size and complexity, security concerns also increase. What …

Network infrastructure devices are ideal targets for malicious cyber actors. Most or all organizational and customer traffic must traverse these critical devices. An attacker with presence on an organization’s gateway router can monitor, modify, and deny traffic to and from the organization. An attacker with presence on an organization’s internal routing and switching infrastructure can …

/ Government Security Alerts /

The Internet of Things refers to any object or device that sends and receives data automatically through the Internet. This rapidly expanding set of “things” includes tags (also known as labels or chips that automatically track objects), sensors, and devices that interact with people and share information machine to machine. Why Should We Care? Cars, …

/ Security Assessments News /

Enlarge / Facebook Chief Security Officer Alex Stamos. Facebook is Struggling to live up to the responsibility it faces for adequately securing the vast amount of personal information it amasses, the social network’s top security executive said in a leaked phone call with company employees. “The threats that we are facing have increased significantly and …

/ Security News /

Image: iStock/matka_Wariatka Microservices are an innovative way to accelerate and improve software development. The term refers to application subcomponents (think ingredients) which can be developed separately and which often focus on one specific function. For example, an ecommerce application for online shopping may have several microservices involving order collection, account access, inventory management and shipping. …

/ Security News /

Image: iStock/Jakub Jirsak Cybersecurity professionals are learning—sometimes the hard way—that Development-Security-Operations (DevSecOps) collaboration is vital to their efforts. Having personnel from each department fully involved in all aspects of a project enhances security-controls integration, reduces scheduling delays, and prevents issues from an after-the-fact implementation of security processes. SEE: DevOps: The smart person’s guide (TechRepublic) There …

/ Government Security Alerts /

Overview Voter registration databases (VRDB) are rich targets and may be an attractive target for computer intrusions. This problem is not unique to individual states—it is shared across the nation. The keys to good cybersecurity are awareness and constant vigilance. What are the threats that may place voter data at risk? Malicious actors may use …

/ Government Security Alerts /

How are routers used in your home network? Home routers have become an integral part of our global communications footprint as use of the Internet has grown to include home-based businesses, telework, schoolwork, social networking, entertainment, and personal financial management. Routers facilitate this broadened connectivity. Most of these devices are preconfigured at the factory and …