Pierluigi Paganini

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, Editor-in-Chief at "Cyber Defense Magazine," a member of the DarkReading Editorial team, and a regular contributor for major publications in the cyber security field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, and The Hacker News Magazine.
Posts by Pierluigi Paganini

Mobile App Security: Threats and Best Practices

June 17, 2015

Mobile device adoption is strategic for every industry, but it has inherent security risks that cannot be underestimated. Many companies offer their employees access to internal systems through mobile platforms; for this reason, an effective bring your own device (BYOD) policy that specifically addresses mobile app security is key. A recent study from Veracode found the average global enterprise... READ MORE

IoT security - Veracode study demonstrates the lack of security posture

April 16, 2015

The Internet of Things devices are everywhere, their diffusion is becoming capillary, but we must carefully consider the aspects related to the IoT security. Internet of Things is the paradigm that most of all is changing our approach to the technology enlarging our surface of attack, a recent research conducted by the security firm Veracode revealed that household IoT devices are exposing users... READ MORE

Are You Secure? An ENISA Study Can Help You Protect Internet Infrastructure Assets

April 8, 2015

The European Union Agency for Network and Information Security (ENISA) has published a new report that analyzes the most important threats to Internet infrastructure assets. The new report focuses on threats to the essential components of the Internet infrastructure that ensure network connectivity from a physical and logical point of view. It also provides a list of countermeasures and best... READ MORE

Reading the ENISA Threat Landscape 2014

April 8, 2015

The European Union Agency for Network and Information Security (ENISA) has published its annual report on the cyberthreat landscape, entitled ENISA Threat Landscape 2014. The document closely examines the evolution of top and emerging threats in 2014. It is considered by the security community to be a valuable analysis of principal threats. The ENISA report provides useful information that could... READ MORE

Companies Worldwide Are Adopting Agile Development Techniques

April 1, 2015

Secure Agile development is a mature, iterative, collaborative methodology that splits the overall development process into smaller phases, or "sprints." A growing number of companies worldwide are adopting Agile, believing it's an efficient way to design robust applications that are resilient to cyberattacks. The best way to understand the global diffusion of Agile development is to survey... READ MORE

Agile Adoption Is the Winning Choice for Secure Software Development

March 25, 2015

When it comes to product development today, Agile adoption is more important than ever. That's because Agile allows for the quick design of robust applications that are resilient to cyberattacks. In many cases, traditional waterfall development doesn't cut it, because it necessitates significant effort and numerous time-consuming steps. And since you don't typically get the opportunity to revisit... READ MORE

Software Evaluation for Government Use: What You Can Learn from the DSCI-BSA

February 13, 2015

Procuring technology, software and services is an important aspect of every government's operations. In many cases, national agencies will even obtain their mission-critical software from third parties. So if there's anything to be learned from the bevy of increasingly sophisticated cyberattacks and data breaches that have occurred over the past few years, it's that governments need... READ MORE

The Retail Cyber Intelligence Sharing Center: Is Joining Right for You?

February 3, 2015

Over the past few years, the number of data breaches that have hit headlines has been nothing short of immense. Even since 2013, which may be better remembered as the "Year of the Retailer Breach," big-name retailers such as Home Depot and Target have suffered colossal blows to their reputations, dealing with issues that involve, among other things, the mass exposure of private customer... READ MORE

Cybercriminals, Hacktivists, and More: Know Your Online Banking Security Threats

January 6, 2015

With the rapid diffusion of online banking services — and the growing number of cyberattacks against them — financial institutions are finding it necessary now more than ever to enhance their online banking security. But who are the hackers responsible for these threats, and what's their motivation? Here's a closer look at the principal categories of attackers who pose threats... READ MORE

Take a Bite out of Cybercrime: The Impact of Data Breaches in Critical Industries

December 29, 2014

Cybercrime is on the rise, enabled by the ever-expanding application portfolio of enterprises everywhere, but the limited expasion of the IT Security team. Many firms still lack adequate security measures or employee security training and remain unaware of any vulnerabilities these malevolent parties can use against them. As a result, it's becoming more and more common to hear about... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu