Cyber Security Chicago Blog

 
 

Can DevSecOps stop the app hackers?

Thursday August 23 2018

As developers are tasked with churning out new applications in record amounts of time, cyber security professionals are left with less time to check for cyber security holes and protect these apps against hackers and other potential breaches. This means that apps often have lengthy windows of vulnerability until cyber security issues are uncovered and addressed. The 2017 “Application Security Statistics Report ” by WhiteHat Security reports that approximately 50 percent of applications are vulnerable every single day of the year.

Read more



Printers & Fish Tanks: Unlikely Vector Attacks in Your Office

Wednesday July 25 2018

The current wave of creativity and innovation in the tech world is a double-edged sword. The boom involving the Internet of Things (IoT), cryptocurrency, and other new technologies have also brought about a wave of hackers, intent on using these same conveniences to profit through illegal scams. In fact, cybersecurity giant Symantec observed a 600% increase in IoT attacks between 2016 and 2017 . Meanwhile, there’s been a staggering 8500% increase in the detection of cryptocurrency miners in the last quarter of 2017.

Read more



Malware is dominating the sandbox

Thursday May 24 2018

At parks and playgrounds, a sandbox is a relatively safe place to play. Little children who tend to fall will softly land on a cushiony pile of sand. The enclosed space also gives them room to experiment with how sand tools, toys, and their own hands and feet interact with the sand environment. A different kind of sandbox offers the same safe experimental environment in the IT world.

Read more



Why Facebook’s data controversy could happen to your company

Thursday May 24 2018

Facebook recently has been at the center of a media controversy as allegations have surfaced that Cambridge Analytica inappropriately obtained data from around 50 million Facebook users, used this data to influence the 2016 presidential election, and failed to delete the data upon Facebook’s request.

Read more



DevSecOps and Formal Security Programs: Friends or Foes?

Thursday October 05 2017

DevOps is supposed to be fast and efficient. Formal security programs, such as those based ISO 27001, are not typically thought of in those terms. So how can these two work together? Let’s look at the goals of each of these, and how DevSecOps can be achieved.

Read more



Equifax mega-breach: Don't be the next victim

Thursday September 14 2017

Last week, credit report giant Equifax revealed that 143 million customers may have had their data compromised in one of the largest breaches ever reported in the US.
 
Malicious cyber-criminals hacked into the system through a web application vulnerabilityproviding identity thieves with everything they need such as social security numbers, birth dates and addresses.

Read more



Top