While agile development is going mainstream, information security is having difficulties to keep pace. The result of this struggle is that new systems are insecure, or that they are loaded with point solutions for security. What is so hard about security in agile environments? In this article we examine what makes infosec fail with agile, in future articles we will propose solutions for that and present a model to integrate information security into an agile development process.
Cyberlink Security Blog
Vulnerabilities to exploit a Chinese IP camera
The objective of this project is to find a potential vulnerability or vulnerabilities in order to exploit a Chinese IP camera using its correspondent app v380s. We devide this Write up into two parts, part 1 focuses on a LAN enviroment, as opposed to part 2 which focuses on a cloud enviroment, where the camera is connected to a chinese server.
Verizon issues their 2020 Mobile Security Index report
Verizon, one of the largest communication technology companies in the world, has published a report on mobile security which finds that “securing mobility is no longer optional, but crucial to securing future innovation and transformation”. Verizon asked survey respondents to rate how crucial mobile is to their business on a 10-point scale; 83% answered 8 […]
Why Traditional Information Security Fails
Four reasons why traditional information security fails in agile environments While agile development is going mainstream, information security is having difficulties to keep pace. The result of this struggle is that new systems are insecure, or that they are loaded with point solutions for security. What is so hard about security in agile environments? In […]
Why is Cyber Security Important?
In a world in which more and more devices and systems are connected via the internet, the awareness of the importance of data security has grown but illegal ‘hacking’ has become an internationally organised crime, cyber security is an imperative for all businesses. Here are four reasons why. 1. Breaches are expensive Cyber attacks can […]