security | TechWell

security

Skull and crossbones shown on a computer screen Protect Your Software through Threat Modeling

Many software organizations are overwhelmed with a laundry list of vulnerabilities. They often have no idea where to start, how to determine prioritization, and whether or not those vulnerabilities accurately represent the threats to our applications, users, and data. Threat modeling is a simple yet effective solution.

Alan Crouch's picture
Alan Crouch
password list Better Check This List: Worst Passwords of 2018

We’ve embraced the IoT in our everyday lives, yet with so many connection points, there’s a risky habit too many of us still need to break—using weak passwords. SplashData evaluated more than five million passwords leaked online during the previous year and compiled the top worst passwords for 2018.

Pamela Rentz's picture
Pamela Rentz
Red lit-up keyboard 4 Reasons Cybersecurity Is More Important Than Ever

Ignoring cybersecurity risks can be disastrous. And as recent hacks and scams have shown, it is not only large organizations or corporations that are being targeted, but also the personal data of everyday people. Here are four reasons cybersecurity is more important than ever, as well as ways you can protect yourself.

Ryan Bronson's picture
Ryan Bronson
Tablet next to a smartphone Up Your Security: Turn On Two-Factor Authentication

You may think that if you always take care not to share personal information online and regularly update security settings, turning on two-factor authentication is an unnecessary step. But the truth is there is always a risk. Let's look into how two-factor authentication keeps your personal information more secure.

Owen Gotimer's picture
Owen Gotimer
For The Web logo Is It Time to Stand Up for the Web?

Does the Web need fixing? Widely acknowledged as the creator of the World Wide Web back in 1994 and the current Director of the World Wide Web Consortium on web standards, Tim Berners-Lee launched #ForTheWeb to help resolve what the organization views as current risks and future challenges.

Pamela Rentz's picture
Pamela Rentz
medical device FDA Updates Cybersecurity Recommendations for Medical Devices

Because of the rapidly evolving nature of cybersecurity threats and risks, the U.S. Food and Drug Administration recently released a draft of updated premarket cybersecurity recommendations on how device manufacturers can better protect their products and proactively address security.

Pamela Rentz's picture
Pamela Rentz
A person tapping their phone to a digital payment system, photo by Jonas Leupe Security Testing Payment Services in the Era of Connected Ecosystems

There are many new trends in online payment technology, so the amount of data passing through and stored across varying systems is growing, requiring new standards for how data is captured, stored, used, and destroyed. Testers especially need to consider vulnerabilities related to data privacy and cyber security.

Elizabeth Koumpan's picture
Elizabeth Koumpan
Sunset over the sea seen from the inside of a large pipe, photo by Erlend Ekseth 5 Features of a Successful DevSecOps Pipeline

When practicing DevOps, how should you include security? What's the best way to build security into an existing continuous integration, continuous delivery, and continuous deployment pipeline? Let’s take a look at five essential features of successful DevSecOps pipelines and analyze where security can benefit most.

Alan Crouch's picture
Alan Crouch