Security by Design and NIST 800-160, Part 4: Technical Processes From ‘Go’ to Disposal

Even if you are not an engineer, NIST 800-160 Volume 1 could help you in your work to understand security by design. It shows what you need to secure your information system. In the other blogs in this series, we’ve summarized the major points of the document. In the final installment, we’ll take a look at […]

The post Security by Design and NIST 800-160, Part 4: Technical Processes From ‘Go’ to Disposal appeared first on Security Intelligence.

Continue reading Security by Design and NIST 800-160, Part 4: Technical Processes From ‘Go’ to Disposal

Security by Design and NIST 800-160, Part 3: Technical Processes

Picking up where we left off on the security-by-design thinking offered by NIST 800-160 Volume 1, we move onward in Chapter 3, focusing on the technical management processes. Let’s look at some security design principles at the technical processes level.  Technical Management Processes Chapter 3.3 shows us eight processes. Like we did in Part 2 […]

The post Security by Design and NIST 800-160, Part 3: Technical Processes appeared first on Security Intelligence.

Continue reading Security by Design and NIST 800-160, Part 3: Technical Processes

Security by Design and NIST 800-160, Part 2: Life Cycle Processes

NIST 800-160 Volume 1 features many guidelines of interest to cybersecurity experts looking to boost their defenses through security by design. As we saw in the first post in this series, the key principles of this document provide a good footing for security. Next, let’s take a look at how the security design principles laid […]

The post Security by Design and NIST 800-160, Part 2: Life Cycle Processes appeared first on Security Intelligence.

Continue reading Security by Design and NIST 800-160, Part 2: Life Cycle Processes

Security by Design and NIST 800-160, Part 1: Managing Change

Building a house requires a blueprint. When it comes to building systems, National Institute of Standards and Technology’s (NIST) documents about security by design are some of the most reliable blueprints. As systems become more complex, they’re also more likely to be fragile. Meanwhile, we continue to add new devices, apps and tools into our […]

The post Security by Design and NIST 800-160, Part 1: Managing Change appeared first on Security Intelligence.

Continue reading Security by Design and NIST 800-160, Part 1: Managing Change

Can we prevent users from generating a QR code with edited information

Currently there is this design of two apps that work together:

Proof app: On customers phone, takes in a textcode and creates a QR code
Scanner app: On hosts phone, Scans the QR code and displays some information like birthday, initial an… Continue reading Can we prevent users from generating a QR code with edited information

Five Things Security and Development Teams Should Focus on in 2021

As we say goodbye to 2020 and spend time reflecting on the industry changes, reassess our workflows and procedures in order to identify where 2021 will bring us, it’s a brilliant time to also address our security practices and ways we can bring improve… Continue reading Five Things Security and Development Teams Should Focus on in 2021

Security by Design y UEM: el enfoque de la ciberseguridad en 2021

El año 2020 se cierra cómo uno de los períodos más agitados en relación con los ciberataques; la declaración de una pandemia a nivel mundial generó toda clase de desinformación y en nombre del COVID-19 muchas compañías cayeron en …
The post Security b… Continue reading Security by Design y UEM: el enfoque de la ciberseguridad en 2021