Secure Defaults and The Design of the Credit System

When designing systems today, everyone is aware that security is an essential feature, even in systems that you don’t think are critical. The recent Equifax breach brought home to me one of the most important factors of designing secure systems (software or not): delivering systems with secure defaults. In today’s threat-rich environment, the secure configuration […]… Read More

The post Secure Defaults and The Design of the Credit System appeared first on The State of Security.

The post Secure Defaults and The Design of the Credit System appeared first on Security Boulevard.

Continue reading Secure Defaults and The Design of the Credit System

Static Code Analysis and You

I have been involved in several efforts to integrate static code analysis into software projects—none have been terribly successful. Most have resulted in hours of time spent identifying and removing false positives. So, when I read Travis Smith’s recent post about Fallible static code analysis, I was immediately struck with the need to add my two bits. First, […]… Read More

The post Static Code Analysis and You appeared first on The State of Security.

Continue reading Static Code Analysis and You

Why Phishing Works

This morning, I checked my email and immediately spotted something suspicious in my inbox. I easily identified this email as a phishing attempt. It contained sparse wording, a link to a file, and the implication that it was sent to me from a safe place “securefileshares.com” (sounds trustworthy to me!) that I had never heard […]… Read More

The post Why Phishing Works appeared first on The State of Security.

Continue reading Why Phishing Works

FBI vs. Apple – Did Anyone Win?

I’ve been following the FBI vs. Apple case, and now that it seems it’s tentatively over, I find myself keeping up with the conversations around who won and who lost. In my opinion, the software industry should strive to provide the strongest possible protections for users’ individual privacy and security. Apple has done just that–so […]… Read More

The post FBI vs. Apple – Did Anyone Win? appeared first on The State of Security.

Continue reading FBI vs. Apple – Did Anyone Win?