How to implement security into software design from the get-go

Software professionals know that the working relationship between developers and security teams can be complicated. Most security professionals feel it’s part of a programmer’s role to write code securely, but most developers get next to no support to … Continue reading How to implement security into software design from the get-go

How would one be able to abuse which fields are linked to which record in a password manager?

I am currently making my own password manager as my main project. But of course, I want to make it sturdy, in case I release it to the public.
The password manager follows this simple structure: A field holds key-value pair (like "Pas… Continue reading How would one be able to abuse which fields are linked to which record in a password manager?

Security teams need to become more proactive and risk-driven

83% of companies would suffer business damage during the first 24 hours of an outage and thereafter, which comes as no surprise with recent surges in ransomware and other attacks wreaking havoc across IT infrastructures, a Dimensional Research survey r… Continue reading Security teams need to become more proactive and risk-driven

How to use pre-existing threat catalogue to determine if a certain system is vulnerable?

There are many risk assessment guidelines such NIST800-30 and ISO 27005 that provide a catalogue of known threats as reference. Using a qualitative approach, I selected one threat events catalogue and I tried to select the threats that are… Continue reading How to use pre-existing threat catalogue to determine if a certain system is vulnerable?

Threat Modeling: The Key to Dealing With 5G Security Challenges

With 5G reshaping the smartphone market, 5G security needs to keep up. Almost one in three smartphones sold in the first quarter of 2021 can connect to a 5G network. That’s just one year after the world’s first commercial 5G network emerged in South Korea. Such growth helped annual shipment numbers of 5G-enabled smartphones exceed […]

The post Threat Modeling: The Key to Dealing With 5G Security Challenges appeared first on Security Intelligence.

Continue reading Threat Modeling: The Key to Dealing With 5G Security Challenges