Don't forget the basics: Cloud Security - Five Lessons from the Yahoo Password Breach by Srinivasan Sundara Rajan. The Yahoo breach "is not really due to the adoption of Cloud or a multi-tenant model rather from not following the age-old best practices." What were these best practices? Among them are not encrypting at a database level, not using the best features of your database, not masking your data and not following security fundamentals during development. In every SDLC security scanning should be a regular process, learn more about best practices for secure coding.
Identity theft surging in recent years: Online identity theft up 200% since 2010 by Emil Protalinski. In the first quarter of 2012 alone 12 million pieces of personal information were traded online by thieves. A staggering number that represents a huge increase since 2010. The trend doesn't show any signs of slowing as application development becomes increasingly popular and mobile goes even more mainstream than it already has. Veracode's dynamic, static and manual solutions can help your company buck the trend and protect your private data.
The President steps up (yes that one): Taking the Cyberattack Threat Seriously by Barack Obama. Mr. President talks about threats to our nation's future and the impending possibility of cyber attacks along with the potential they have for disrupting our systems; "Taking down vital banking systems could trigger a financial crisis. The lack of clean water or functioning hospitals could spark a public health emergency. And as we've seen in past blackouts, the loss of electricity can bring businesses, cities and entire regions to a standstill." Always great to see leadership recognize the potential of technology and the importance of security!
Tackling the BYOD revolution starts with code: For BYOD Best Practices, Secure Data, Not Devices by Thor Olavsrud. BYOD is coming whether or not companies like it, as popularity grows companies will learn to secure from the ground up. Rather than securing every device, secure your data with solid coding fundamentals to avoid vulnerabilities in the first place.
Flame off, Messiah on: Move over, Flame: New Messiah-themed malware targets Iran, Israel by Dan Goodin. This new espionage malware was discovered stealing e-mails, passwords, computer files, and nearby conversations from more than 800 PCs operated by critical infrastructure companies, financial institutions, and government agencies.