software

Home/Tag: software

Layer 8 Security Presents at Rittenhouse Ventures’ Technology Leaders Forum

PRESS RELEASE Contact: Kat Jimenez, Sales and Marketing Assistant  kat.jimenez@layer8cybersecurity.com February 9, 2016 - The Navy Yard, Pennsylvania - Layer 8 Security presented at the inaugural Technology Leaders Forum hosted by Rittenhouse Ventures at their headquarters in Philadelphia. Chief Technology Officers and senior leaders within the Rittenhouse Ventures portfolio of companies attended the event to discuss the challenges and opportunities relating to technology. Following the theme of the forum, Layer 8 Security spoke about Data Security and covered the following [...]

Today’s SDLC and Cybersecurity – Coding, SMEs, and Spaghetti

One of our friends in the insurance world sent us an email with an interesting article about the nature of "secure programming" (see here for the article) and how it has influenced some of the information security challenges the market is facing. I initially shared my insights (below) to the email, but I figured it was worth posting. Enjoy! -- -- Over 30 years ago, one of my personal heroes (Ken Thompson, coder-extraordinaire and inventor of the B and Go programming languages) said something [...]

Encryption for Everyone – Part 2 Windows

In part 2 of our blog series on encryption we will focus on those who are running Windows.  BitLocker is fairly easy to set up and will keep your data-at-rest safe while your computer is powered down. What is BitLocker? BitLocker is Microsoft's easy-to-use, proprietary encryption program for Windows that can encrypt your entire hard drive(s) as well as protect against unauthorized changes to your system such as firmware-level malware. System requirements To run BitLocker you need a Windows PC [...]

Inspecting Cyber Events Of July 8

By now, you've probably seen and heard a wealth of coverage pertaining to the cyber events that took place on July 8, 2015 and are known to have impacted the New York Stock Exchange and United Airlines, at the very least. Many people are reading of the reports and hearing one of two scenarios-these were very large and debilitating glitches-albeit oddly coincidental. Or that these were orchestrated attacks that could be part of a larger-scale cyber war. We know at [...]

Next Steps In Password Security

It used to be that you had one or two passwords. They rarely, if ever changed. You may have even had it written down on a Post-It note, placed securely next to the very PC it protected. Nowadays? Even if you are not a sysadmin, odds are you have half a dozen (or more) accounts and passwords, covering everything from e-mail to Facebook to online banking and trading accounts.  Odds are, you have a file somewhere to keep track of [...]

Serious iOS messaging bug can crash your iPhone

Everyone who uses an Apple device should be on the lookout for a new threat that can crash/reboot your device.  Users of Apple’s desktop and mobile operating systems are experiencing crashing computers, phones, and tablets across the internet.  This is caused by a bug in Apple's rendering engine of Arabic text when a message gets shortened. The text that will cause this can be seen in the image below: By the time you’ve received the malicious text, it’s probably too late. [...]

Prevention Trumps Detection

Some of you may see that headline and consider me Captain Obvious, but it's worth saying regardless. For as many IT staffers out there prefer to take the approach of threat prevention and avoidance, there are still plenty  that are content to detect and remedy. And that method has a major flaw-detection time. While some security appliances do provide real time, or near-real time threat detection and reporting, deployment of such tools is not as common as, say, a wireless [...]

Malware… for humans?

Imagine going to your general practitioner's office for an annual physical. Your doctor checks your blood pressure, your heart rate, your temperature. Your doctor likely quizzes you about your diet, exercise, smoking habits, whether your artificial body parts are up-to-date with the latest patches. Wait. What? As if we didn't have enough devices to stay on top of. The benefits of treating chronic conditions with medical devices, such as a pacemaker or an artificial pancreas, are recognized; however, keeping those [...]

Healthcare Breaches Are Big Business

Many people have opined that this year could be the year of the healthcare hack, much like 2014 will be known for the Sony debacle. But these hacks are not about curious kids hacking around in their parent's basement. They have not been for a good while now. Though you will from time to time come across someone actually doing things for fun, the breaches are now, more than ever before, about finding holes, exploiting vulnerabilities and...cashing in. Hackers are [...]

A Cyber Attack On… Yourself?

Some cyber security polices are thrust upon us and that is the topic of this post. Just likeWindows XP expiring in April 2014 there are times when software or hardware we are running on our systems comes to the end of life. No more cycles to run…. With technical and security support gone, you are flying without a net. How do you solve this problem? With solid policies, governance, information assurance, and a business continuity plan. Which, by the way, [...]