hardware

Home/Tag: hardware

Today’s SDLC and Cybersecurity – Coding, SMEs, and Spaghetti

One of our friends in the insurance world sent us an email with an interesting article about the nature of "secure programming" (see here for the article) and how it has influenced some of the information security challenges the market is facing. I initially shared my insights (below) to the email, but I figured it was worth posting. Enjoy! -- -- Over 30 years ago, one of my personal heroes (Ken Thompson, coder-extraordinaire and inventor of the B and Go programming languages) said something [...]

Encryption for Everyone – Part 2 Windows

In part 2 of our blog series on encryption we will focus on those who are running Windows.  BitLocker is fairly easy to set up and will keep your data-at-rest safe while your computer is powered down. What is BitLocker? BitLocker is Microsoft's easy-to-use, proprietary encryption program for Windows that can encrypt your entire hard drive(s) as well as protect against unauthorized changes to your system such as firmware-level malware. System requirements To run BitLocker you need a Windows PC [...]

Encryption for Everyone: Part 1 OS X

Information Security is evolving at an exponential rate.  What cut it 10 years ago would make today’s cybersecurity analysts cringe.  We will cover other aspects of keeping you safe from threats in future posts, but for now let’s focus on your physical hardware and more specifically encrypting your data.  If your laptop is lost or stolen you are at risk of someone inserting a USB stick, booting an operating system (ie. Linux)  and making your entire hard drive unencrypted and [...]

Healthcare Breaches Are Big Business

Many people have opined that this year could be the year of the healthcare hack, much like 2014 will be known for the Sony debacle. But these hacks are not about curious kids hacking around in their parent's basement. They have not been for a good while now. Though you will from time to time come across someone actually doing things for fun, the breaches are now, more than ever before, about finding holes, exploiting vulnerabilities and...cashing in. Hackers are [...]