This is Ed Adams's Typepad Profile.
Join Typepad and start following Ed Adams's activity
Join Now!
Already a member? Sign In
Ed Adams
Recent Activity
I had an interesting experience when ordering a gift for my wife online at a popular personalized gift store. We love drinking wine, so my plan was to inscribe a set of 6 wine glasses. Like many couples that haven’t hit the 10 year anniversary yet, we have nicknames for... Continue reading
Posted Feb 12, 2016 at Application & Cyber Security Blog
There are a million reasons why technology can lead to a data security breach. I could sit here and write about all of them (and publish a novel as opposed to a blog), or I could just focus on the #1 factor in data security that affected ALL of us... Continue reading
Posted Mar 12, 2015 at Application & Cyber Security Blog
Today, many financial services organizations are using mobile apps to amp up customer service and efficiency. These same apps, though, are probably a security problem waiting to happen. Fortunately, smart development teams can mitigate the risk by asking the right questions. The new mobile landscape Five years ago, there just... Continue reading
Posted Mar 7, 2014 at Application & Cyber Security Blog
There has been a lot written on the disruptive technology shifts to mobile and cloud platforms and the security challenges each bring; however, in the shuffle, a stalwart staple of Enterprise IT (and emerging threats to it) have been overlooked -- the datacenter. Datacenters don't house just big iron with... Continue reading
Posted Nov 14, 2013 at Application & Cyber Security Blog
At Security Innovation (SI), we have a passion for application security and excellence that is pervasive throughout the organization. It manifests in the commitment to our customers, our commitment to each other and our drive for excellence in all we do. An integral part of our culture is a willingness... Continue reading
Posted Aug 1, 2013 at Application & Cyber Security Blog
Other than the mistake of simply NOT educating developers about secure coding, it seems that some organizations continue employing unproductive ways to try to get their development staff to code securely. Some organizations want to make security invisible to developers so they leverage an array of frameworks and pre-written libraries/routines... Continue reading
Posted Jun 20, 2013 at Application & Cyber Security Blog
SCADA systems continue to be shown vulnerable, but don't worry, it's only our nation's critical infrastructure. The 12th annual ICS Cyber Security Conference was held at Old Dominion University a few weeks ago (October 22-25, 2012.) What was reinforced is how far behind our industry is with respect to cyber... Continue reading
Posted Nov 27, 2012 at Application & Cyber Security Blog
Two weeks ago, The United States Court of Appeals reversed a lower court’s decision, ruling that the IT security system used by a domestic bank was not “commercially reasonable” to protect its customers.This sets a dangerous precedent, albeit a welcomed one for many security professionals. As I've written before, I... Continue reading
Posted Jul 17, 2012 at Application & Cyber Security Blog
There is a draft law by the EU that would make attacks on IT systems a criminal offense and punishable by at least two years in prison. Additionally, possessing or distributing hacking software and tools would be an offense. I understand the potential motive here: reduce the number of attacks... Continue reading
Posted Apr 24, 2012 at Application & Cyber Security Blog
one step forward, two steps back A Republican bill was introduced in the House of Representatives this week (ref: similar to the cleverly-named but ill-conceived SECURE IT bill GOP Senators introduced last month. A major difference between this bill and the Lieberman-Collins bill (as well as the Langevin bill... Continue reading
Posted Apr 3, 2012 at Application & Cyber Security Blog
To be released to the public on March 20th: results of new research from The Ponemon Institute, IBM, and Security Innovation. The study analyzed over 800 InfoSec/IT and software development professionals to understand the application security maturity (ASM) in their organizations – the skill levels, procedures followed, and tools adopted... Continue reading
Posted Feb 24, 2012 at Application & Cyber Security Blog
Yesterday the BPD got defaced, the hacktivist group Anonymous taking claim. For a while the site had a OWS message (related to Boston's forced exit of the Occupy Boston protesters.) The site seems to be back to normal now. This is one of many F*uckFBIFriday hacks that were planned for... Continue reading
Posted Feb 4, 2012 at Application & Cyber Security Blog
Recently we received a request to test a couple of consumer devices -- the vendor wants us to try and root the device and gain access to protected applications and data. A common worry for the security-conscious company. The trouble is most manufacturers of consumer devices are not security-conscious. Several... Continue reading
Posted Nov 29, 2011 at Application & Cyber Security Blog
"Director of National Intelligence James Clapper said Monday that intelligence agencies will have to absorb budget cuts of at least $10 billion over the next decade, and information technology -- now accounting for up to 25 percent of the intelligence budget -- would be a prime candidate for savings. "If... Continue reading
Posted Oct 20, 2011 at Application & Cyber Security Blog
In my previous blog, I talked about how I was encouraged that Sony was going to create the CISO position, but disappointed that they’d be reporting to the CIO (a position that I feel is inherently in a conflict of interest with the CISO position). However, I got some great... Continue reading
Posted Sep 14, 2011 at Application & Cyber Security Blog
Ed Adams is now following The Typepad Team
Sep 8, 2011