Your 2019 Essential Software Security, Development, & DevOps Conferences

“DevOps” encompasses a wide range of topics – throw security in there and you’ve added even more. This roundup includes events throughout the year and around the globe, from small events to community conferences and up. Whether … Continue reading Your 2019 Essential Software Security, Development, & DevOps Conferences

Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack

Phishing is the most common type of cyber-attack that impacts organizations both large and small. These attacks may take many forms, but they all share a common goal – getting you to share sensitive information such as login credentials, credit c… Continue reading Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack

Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Air-gapping means physically isolating a secure computer from unsecured networks, such as the public Internet or an unsecured local area network. The concept of air-gapping represents just about the maximum protection one network can have from another,… Continue reading Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Cardiac patient data at risk, Philips reports

It’s never good news to find out that both your personal and clinical information could be compromised by the software platform your healthcare provider is using. But it’s at least somewhat better news to know that the company responsible f… Continue reading Cardiac patient data at risk, Philips reports

Medical devices still hackable, researchers say

Security researchers Jonathan Butts and Billy Rios wanted to make it clear at the beginning of their presentation. “The benefits of implanted medical devices outweigh the risks (for most people),” read one of their opening slides. But they … Continue reading Medical devices still hackable, researchers say