As the world becomes more complex non-traditional approaches to ensuring data security and protection must be evaluated. In this article Wei Chieh, the founder of SWARMNETICS draws a parallel between how we treat open source software and the Asian organisational attitude toward White Hat hackers (or ‘independent security researchers’) as assets that might help to stem the tide of security breaches that Asian companies face today.
So how does the United States Air Force with over 5,000 aircraft in its inventory make sure that it’s online security is top notch? It’s simple – it invites people to hack its systems.
For 24 days, 272 hackers pounded the Air Force's key public websites. The result? A cool 207 vulnerabilities were found, resulting in a $130,000 payday for the White Hats.
The U.S. government reveals the Vulnerabilities Equities Process which decides if vulnerability data is released or gets stockpiled as cyber weapons.
Recent DEFCON Voting Village report showed that some of the most popular and widely used voting machines vulnerable to hacking and that their security in the upcoming election is anything but assured.
GAO audits carried out between fiscal years 2012-2017 have discovered significant cyber vulnerabilities in the U.S. Department of Defense’s top weapons systems, reflecting a misguided approach that does not take into consideration basic cyber security.
Beyond the challenges around risk and uncertainty, can bug bounties really deliver on their promise? Even as crowdsourced security testing continues to gain acceptance, what’s important is designing the right model to increase efficiency and avoid diminishing marginal returns.
Preloaded apps on current Lenovo, HP and Dell systems are found to have unique and serious security vulnerabilities that require end users to take extra steps to fix.
U.S. Department of Homeland Security aims to help software developers and security researchers eliminate common software vulnerabilities by releasing a list of top 25 most dangerous software errors.