cyber security | TechWell

cyber security

NSA NSA Adds to Open Source Tools and Tech Transfer Program

The National Security Agency recently released several of the agency’s software tools as open source and added new technologies to the NSA technology transfer program patent portfolio that are ready for licensing. Could leveraging any of these technologies help your efforts?

Pamela Rentz's picture
Pamela Rentz
medical device FDA Updates Cybersecurity Recommendations for Medical Devices

Because of the rapidly evolving nature of cybersecurity threats and risks, the U.S. Food and Drug Administration recently released a draft of updated premarket cybersecurity recommendations on how device manufacturers can better protect their products and proactively address security.

Pamela Rentz's picture
Pamela Rentz
hacker using computer Security Testers Should Think like Hackers

It is a common belief that testers should think like end-users by going beyond the defined requirements, seeing if the application under test addresses end-user expectations, and evaluating how it fares against competition. But with security testing, testers have to think not only like end-users, but also like hackers.

Rajini  Padmanaban's picture
Rajini Padmanaban
password written on sticky note What Are the Worst Passwords of 2017?

The more things change, the more they stay the same. For the fourth straight year, the top spots in the annual worst passwords of the year list issued by password management company SplashData are unchanged. People apparently still use “123456” and “password.”

Pamela Rentz's picture
Pamela Rentz
password 123456 on sticky note Are Your Passwords on This List?

Some things never change and, unfortunately, picking bad passwords that put you at risk of identity theft seems to be among them. The 2016 Worst Passwords List has been released by SplashData, the password management company that releases the annual list of the worst of the worst passwords.

Pamela Rentz's picture
Pamela Rentz
Online Identify Theft Is Only Getting Easier

An expanding reliance on digital services requiring the input of personal information has increased the risk of data theft, and it only takes a few common pieces of information for the best thieves to steal your identity. More than ever, we need strong security systems to be developed.

Josiah Renaudin's picture
Josiah Renaudin
How the New Retailers' Security Knowledge Base Will Benefit Testers

In an initiative to curb cyber attacks, a group of retailers created a forum called the Retail Cyber Intelligence Sharing Center. Stores such as Lowe’s, Nike, and Target formed the center with the goal of identifying new threats and sharing how to mitigate risk, which will help security testers.

Mukesh Sharma's picture
Mukesh Sharma
Heart-to-Heart Security Proposed for Implanted Medical Devices

Like any wireless device that can be accessed remotely, implanted medical devices are vulnerable to hacking. The FDA acknowledged that embedded medical devices are a potential target for cyber security breaches and issued a warning to device manufacturers. Pamela Rentz looks at a proposed solution.

Pamela Rentz's picture
Pamela Rentz