This is Security Innovation's Typepad Profile.
Join Typepad and start following Security Innovation's activity
Join Now!
Already a member? Sign In
Security Innovation
Boston, MA
Marketing Manager at Security Innovation
Interests: Marketing, Social Media, Application Security, Software Security, Puppies.
Recent Activity
Image
A lot has been written about whether Apple should comply with the recently publicized FBI demands surrounding the San Bernardino attack last year. However, I’m going to avoid the political side of the debate and focus on the technology instead. One could argue Apple has fallen victim to the old... Continue reading
Posted Feb 22, 2016 at Application & Cyber Security Blog
Image
I had an interesting experience when ordering a gift for my wife online at a popular personalized gift store. We love drinking wine, so my plan was to inscribe a set of 6 wine glasses. Like many couples that haven’t hit the 10 year anniversary yet, we have nicknames for... Continue reading
Posted Feb 12, 2016 at Application & Cyber Security Blog
The strongest defense against threats to an organization's data includes security controls, which focus on a main objective of proper security implementation in support of data privacy. These safeguards are used to avoid, detect, and prevent unauthorized access to your organization's facility – protecting your employees and company information. Controls... Continue reading
Posted Jan 28, 2016 at Application & Cyber Security Blog
Image
Security Innovation has been securing Vehicle-to-Vehicle communications for almost 10 years, but for the average consumer, car hacking only came to light in 2015. As the year draws to an end, here’s a look at some of the events in 2015 that made car hacking go mainstream. January A researcher... Continue reading
Posted Dec 15, 2015 at Application & Cyber Security Blog
Image
If you have been following any of my posts over the past few months, you'll already know that there have been a flurry of recent quantum computing and quantum-resistant cryptography announcements from the NSA, Google, and IBM, to name a few. You can now add Kaspersky Lab to the list... Continue reading
Posted Dec 4, 2015 at Application & Cyber Security Blog
Image
The holiday season is a time we often use to spend with family and friends. Unfortunately, for many of us, leading up to the holiday can be a hassle. Between online shopping for presents and traveling to see family, this time of year is busy and online security is usually... Continue reading
Posted Nov 24, 2015 at Application & Cyber Security Blog
In the Information Security industry there are a number things that we do well, and a few areas where we could improve. Often, as security professionals we devote a lot of our time working on or providing products and services to large enterprises and less time is spent with the... Continue reading
Posted Nov 12, 2015 at Application & Cyber Security Blog
The Librarian of Congress recently announced exemptions to the Digital Millennium Copyright Act (DMCA) that now make it legal to circumvent specific technological measures that control access to copyrighted works, including software on DVDs, Smart TVs, and, of most interest to me, automobiles. Drivers should be happy with this announcement,... Continue reading
Posted Nov 6, 2015 at Application & Cyber Security Blog
Image
Last week, the United States House Energy and Commerce Subcommittee on Commerce, Manufacturing, and Trade released a number of staff drafted proposals, a few of which addressed automotive cybersecurity and privacy. On the privacy side, the proposal calls for car makers to establish a privacy policy regarding the collection, use,... Continue reading
Posted Oct 19, 2015 at Application & Cyber Security Blog
Image
October is National Cyber Security Awareness Month and Security Innovation is making it’s mission to help everyone become a better digital citizen. Continue reading
Posted Oct 6, 2015 at Application & Cyber Security Blog
Image
At Security Innovation, we have been warning customers of the threat of quantum computers towards public key infrastructure (PKI) and asymmetric cryptography for many years. We warn our customers of the significant impact on their business when quantum computers can instantly break their key exchange and digital signatures. We warn... Continue reading
Posted Sep 29, 2015 at Application & Cyber Security Blog
The Lost Beast On December 4th 2011 a stealth Unmanned Aerial Vehicle (UAV) on patrol near the Iran-Afghan border went dark. The next day, Iranian state television released video of the RQ-170 Sentinel drone, seemingly undamaged and in possession of the Iran Revolutionary Guard. Nicknamed the “Beast of Kandahar” after... Continue reading
Posted Sep 4, 2015 at Application & Cyber Security Blog
Oracle CSO Mary Ann Davidson criticizes third-party security consultants and their enterprise customers who use them for running security tests on their code. Continue reading
Posted Aug 28, 2015 at Application & Cyber Security Blog
The NSA recently acknowledged security threats posed by quantum computers and announced a plan to transition to quantum resistant algorithms. Continue reading
Posted Aug 25, 2015 at Application & Cyber Security Blog
Note: this original blog post was published on Embedded.com; read it here. The U.S. House of Representatives recently passed the USA Freedom Act that addresses the controversial surveillance of communications by the NSA. The legislation would prevent the government from issuing orders for bulk collection. Instead, law enforcement would have... Continue reading
Posted May 18, 2015 at Application & Cyber Security Blog
Google Glass Launches Before Google Glass became available in 2013 through the invite only “Google Explorer” program, the device had already been celebrated by some as the dawn of a new computing age and derided by others as an expensive play toy for the rich. Privacy minded groups wondered out... Continue reading
Posted Mar 17, 2015 at Application & Cyber Security Blog
One of the common complaints I hear about application security professionals is that the supply of these engineers is not meeting the demand. As sensitive data breaches are becoming more common, the need for a skilled and experienced security team has never been higher, but the path to gain those... Continue reading
Posted Dec 17, 2014 at Application & Cyber Security Blog
Social media is a great way to stay connected and share information with friends, family, and professional contacts. While applications such as Facebook, Twitter, Tumblr, and Snapchat are incredibly popular, they are also primary targets for scammers and hackers. Most social media interactions assume a level of trust. Users share... Continue reading
Posted Dec 11, 2014 at Application & Cyber Security Blog
When I began working on PGPy back in April, the decision to do so was not made lightly. Another software engineer here was in need of a Python OpenPGP library that was able to fulfill some requirements which the one he was using could not do. In order to help... Continue reading
Posted Dec 1, 2014 at Application & Cyber Security Blog
Social engineering stories have captured attention on the silver screen for years, including one of the oldest forms of the social engineer: the con man. Moviegoers revel in the suspense and clever trickery, and are divided only by either their affinity for the bad guy, or their desire to see... Continue reading
Posted Nov 18, 2014 at Application & Cyber Security Blog
There are significant risks associated with transmitting confidential data or sensitive personal information via e-mail. These emails can be intercepted by hackers and cause serious problems for you and your company. This is why PCI DSS requirements prohibit sending payment card data by email, IM or chat unless it is... Continue reading
Posted Nov 14, 2014 at Application & Cyber Security Blog
Those Who Can’t Do, Teach Steal A password is private and confidential piece of data. It has the ability to protect sensitive personal and business information. A simple set of characters can be the sole gatekeeper to all of your financial and private information. Because of this, attackers continuously target... Continue reading
Posted Nov 5, 2014 at Application & Cyber Security Blog
Threat Assessment The SQL Injection vulnerability in Drupal versions 7.0 through 7.31 is an extremely dangerous vulnerability that is likely to have profound implications for the Internet as a whole. This vulnerability is particularly serious because it is extremely easy to exploit, affects a large number of assets and systems... Continue reading
Posted Oct 28, 2014 at Application & Cyber Security Blog
PCI 3.0 Motivates Organizations to Train Developers to Write more Secure Code ...Application Security Professionals Rejoice! As we charge into another holiday season here in the States, the most recent version of the Payment Card Industry Data Security Standard (PCI DSS) has been released. The changes incorporated into Version 3.0... Continue reading
Posted Oct 23, 2014 at Application & Cyber Security Blog
Image
You can do What???? From an Android Phone???? Hijacking airplanes with an Android phone So it appears that there is valid concern by the airlines when they make their customers turn off their phones during take off and landing. A security researcher- who is also a pilot- has been able... Continue reading
Posted Oct 23, 2014 at Application & Cyber Security Blog