Are injection vulnerabilities a design or an implementation flaw?

Are injection vulnerabilities mainly a design or an implementation problem? I’m using SQL injection as an example; I’m interested in other injection vulnerabilities as well.

I believe that it is the direct consequence of lazy programming,… Continue reading Are injection vulnerabilities a design or an implementation flaw?

How Do We Ensure the Security of What Comes After the 5G Revolution?

2020 will see huge investments in 5G networks, but what will the next telecommunication revolution look like? And how do we ensure this system is safe and secure?

The post How Do We Ensure the Security of What Comes After the 5G Revolution? appeared first on Security Intelligence.

Continue reading How Do We Ensure the Security of What Comes After the 5G Revolution?

About That IoT Device You Received as a Holiday Gift…

An IoT device can be extremely useful in your everyday life, but like all technologies, it still has flaws and can add to your risk profile.

The post About That IoT Device You Received as a Holiday Gift… appeared first on Security Intelligence.

Continue reading About That IoT Device You Received as a Holiday Gift…

Connected Car Security Is a New Kind of Mobile Security Risk

With so much pessimism surrounding the threat landscape in the automobile industry, it’s encouraging to hear that manufacturers are embracing connected car security concepts more than ever before.

The post Connected Car Security Is a New Kind of Mobile Security Risk appeared first on Security Intelligence.

Continue reading Connected Car Security Is a New Kind of Mobile Security Risk

6 Tech Gifts for Adults That Are Secure by Design

Not sure what to gift your loved ones this year? Here are six tech gifts for adults to help them stay secure in the new year.

The post 6 Tech Gifts for Adults That Are Secure by Design appeared first on Security Intelligence.

Continue reading 6 Tech Gifts for Adults That Are Secure by Design

Attain Embedded Cloud Security With a DevSecOps Approach

A DevSecOps approach to cloud security can embed fast-paced, collaborative and iterative processes in cloud environments.

The post Attain Embedded Cloud Security With a DevSecOps Approach appeared first on Security Intelligence.

Continue reading Attain Embedded Cloud Security With a DevSecOps Approach

The Potential and Perils of the IoT in Healthcare

The IoT in healthcare is ever-expanding. This growth is bringing new capabilities and opportunities for innovation but also new challenges and security risks.

The post The Potential and Perils of the IoT in Healthcare appeared first on Security Intelligence.

Continue reading The Potential and Perils of the IoT in Healthcare