A Deduction of Errors
Hacking by Design
As early as 1994, the concept of security by design was beginning to take shape; anticipating malicious intent and incorporating designs to circumvent or altogether exclude scenarios exploiting vulnerabilities in software—and to..
The 4 Ingredients Needed for Securing Data, First
Creating a tight security plan has in the past few years become a concerning aspect of IT for any business, whether established on the scene or just starting up. Traditional security models bring up images of fortresses and safes—walled..
The two most important steps to keep your data secure
Although we all recognize that keeping our data safe is important and encryption is something we've probably heard about, how many of us really understand what that means? I know I'm learning more every day. Like the fact that we have TLS and SSL..
Why Software Remains Insecure—and Why It Really Shouldn't
In a recent blog post, Daniel Meissler theorizes that the benefits of quickly building bad software have so far outweighed the downsides. Though this sounds plausible and seductive, there is a more insidious picture being overlooked. Let me..