Shared posts

12 Jun 18:13

Integrating Security into Software Development

One of the most important aspects of creating a secure software solution is to focus on security from the start, it cannot be tested in. Many organizations make extensive use of security testing products to help find security vulnerabilities that exist in software solutions after deployment but which could possibly identified by integrating security during development.

 

There are many different strategies that an organization can use to ensure security development (SDL) practices are integrated into the Systems Development Life Cycle SDLC but my focus here is to summarize some important factors to consider in that strategy. Processes for integrating security in software development are usually customized and different from one organization to another and therefore, it is one topic that is difficult to learn in an information security course of study. The difference in my opinion is due to various factors that include (1) risk tolerance, (2) security culture and (3) capability maturity levels of information security processes within an organization.

 

secriskthreat2.jpg

 

Understanding the 3 factors described above are very important in this scenario. One example of a secure culture would be an organization that has already established an information classification standard. This will assist in determining a level of risk for the “information” being processed by a software solution being implemented. If this is non-existent, you may have to get advice from a risk consultant or research what is being done in the industry to place a value on the type of information needing to be protected. Information Security processes for an entire organization can follow recommendations and concepts as documented in the ISO 27000 series standards. Obviously, if the processing involves handling or storing of information that is considered personal identifiable information (PII), that is a good indicator of where there is value to a potential attacker. Note that information can still be considered private in the sense that a person may not wish for it to become publicly known, without being personally identifiable. Another risk could be the disclosure of intellectual property which is always more difficult to value but fits into the category of risk tolerance for the organization. Establishing a secure culture is the intent of a good security awareness program that describes the audience as partners in risk management.

 

Most importantly, security is a process and not a one size fits all process at that. Some of the things to consider when developing a process to integrate security are Threat Modeling that includes the mitigation techniques that define security requirements and “Security Testing” similar to penetration testing but specifically focused on the security requirements for the software. The capability maturity level of the processes that integrate security into the development practices help not only define them but push for active optimization.

The security process in an organization of any size should be one targeted for constant improvement. Integrating security requirements early on in the SDLC can provide valuable contribution to a Risk Management program and good defense-in-depth security strategy. Moreover, there have been many estimates throughout the industry that have proven security issues to be much less costly to an organization when they are identified early during development rather than after deployment.  Software use cases and user population can change over time due to the need for more access to information and as those changes are made, security ramifications should be considered as well. For this reason, a security process defined and integrated early in the entire lifecycle is very important.

 

Andy

12 Jun 03:44

Is PRISM Precipitating A Bitcoin Sell-Off?

by John Biggs
prism2

Bitcoin has experienced a fairly massive drop in value over the weekend and into this week, moving from a peak of $118 on June 7 to a low of $89 on June 9. While precipitous drops and dizzying highs aren’t unusual for the cryptocurrency, BTC watchers are pointing to the PRISM and NSA leaks as a cause for this weekend’s massive dip.

The wonks at CoinDesk note that Sundays are usually slow for the market in general. On the ninth, however, the volume spiked past recent highs and the price dropped precipitously. The correlation between price and the PRISM news making the rounds this weekend – while not airtight – is at least plausible.

Bitcoin is controlled primarily by market sentiment. While a few big players can move the market a few notches, it’s clear that the currency does get hit with periodic storms related to attacks and, more important, news relating to privacy and finance. Users, then, are in the unenviable position of dealing with online mobs whose impetus and trading inspiration are far more opaque than, say, a retail equity trader’s. But why the drop?

Most BTC owners are of the mind that the transactions between wallets are completely anonymous and, in theory, they are. However, as more and more cash changes hands, it’s obvious that someone somewhere wants to watch where these BTCs are going. While it’s hard to see exactly who is getting what using any sort of transaction log, the associated metadata collected by various outfits, the NSA included, point to transfers into and out of BTC.

In short, Bitcoin users are stuck: They revel in the anonymity but are unsure of the degree. That’s a problem that will become more and more disconcerting as the currency grows in popularity and strength.


11 Jun 17:46

In Writing Platform Push, Draft Lets You Collaborate Then Publish Anywhere

by Eric Eldon
Screen Shot 2013-04-24 at 8.48.18 AM

Draft, a streamlined online word processor with version control, is getting deeper into the new professional publishing ecosystem.

The one-man team of Nathan Kontny has just introduced a new REST API that’ll let any news outfit or other publishing organization connect Draft to the other software it uses. If you’re Buzzfeed or The Huffington Post* or another media company with a big mix of full and part-time writers, you could use the API to let writers and editors work through versions together in Draft then publish straight to your custom content management system.

Meanwhile, if you’re running a group blog using a standard setup from WordPress or Blogger and you want a more pristine, versioned environment, Draft now lets you publish from it to them.

Since launching in March, it has also added features to publish to Tumblr, Twitter and most recently LinkedIn and MailChimp (which should be particularly useful to content marketers).

Beyond publishing out, Kontny has also made it much easier to pull in content for a draft. He’s added audio and video transcription, a two-way sync tool with file storage services like Dropbox, Evernote, and Google Drive, and a Chrome extension that lets you pull text into a new or existing draft.

The updates have been coming fast. He’s also built commenting so collaborators can discuss specific sections of a draft, and simple social analytics that let you measure tweets about your writing based on word count, day of the week, and reading comprehension level.

Draft, and private-beta competitors like Editorially and Poetica (please invite me, folks) are trying to create a new writing-centric platform to go along with the leading publishing tools of the day. It plays friendly with publishing tools, but isn’t trying to deal with web site design and hosting, or massive backend content management.

The API and publishing options, the transcription and syncing tools, and comments all help it toward that goal.

I have a suggestion for an additional editing feature, that can be crucial to any pro writing team. When you share a link in Draft, your collaborator can only see and edit the most recent draft you share. They can’t view the entire set of them. If this person is, say, your editor at your publication, they need full access to see your thought process and any changes you make to their edits, and should have the power to publish.

And Kontny also may want to consider integration over development for other parts of Draft. Lots of companies provide great analytics tools for online publishing, like Chartbeat for articles or Hootsuite for social media management. Why not work to integrate with all of them instead?

This sort of refining will be crucial for any writing software that aims to be a part of publishing’s future. The big CMS companies are busy fleshing out the drafting side of things. WordPress.com recently pushed a great upgrade to its revisions tool, for example.

Meanwhile, more and more big new publishers, like Vox Media, are choosing to build their own CMSs in-house to gain full control over all aspects of the organization. Startups like Draft could become a part of each of these systems if they nail major sub-use cases such as writing collaboration, particularly with features like the new API. But it’ll be challenging to balance the enterprise-level demands like the editor control I want with self-publishing needs like its freelance editor service.

I say this from personal experience. My own startup, WriteWith, tried to do some of each nearly a decade ago, and ended up doing neither well enough to survive.

*HuffPo got a mention because they’re one of the larger online news-oriented publishers out there, not because they’re also owned by TechCrunch parent company Aol.


10 Jun 07:36

Skype co-founder reveals service's origins as WiFi-sharing network

by Mariella Moon

EDIT SkypeFon

Everyone and their mother knows Skype as a call and chat messenger, but it would've been a completely different beast if its founders' original plans came to fruition."The initial idea was to develop a WiFi-sharing network, and then provide various 'telecom-like' services on top of that, such as TV and telephony," explained founding engineer Jaan Tallinn in a Reddit AMA.

Tallin compared the project to Fon, but he and his co-founders hit a wall: they couldn't offer TV services because they were battling copyright lawsuits as developers of P2P file-sharing site Kazaa. The team also had trouble finding a decent VoIP product to attach to the service and wound up concocting their own technology instead. The new VoIP tech, which was supposed to be named Skyper until the team noticed Skyper.net was already taken, eventually became the focus of the service. It's an interesting look at the birth of the chat messenger we know today. Now if only we could figure out if the government has direct access to Skype's logs, we'd be set.

Filed under: Software

Comments

Via: GigaOM

Source: Reddit

02 Jun 23:05

'White Maskers' Protest Thai Government

Demonstrators, many wearing white Guy Fawkes masks, marched peacefully through Bangkok, Thailand's business district Sunday to protest the government of Prime Minister Yingluck Shinawatra. The White Maskers, as they call themselves, claim that the government is a puppet of exiled former prime minister Thaksin Shinawatra, who was ousted in a military coup in 2006. A pro-government demonstration is planned for later in the day.
02 Jun 05:06

Intel Haswell CPUs Debut, Put To the Test

by timothy
jjslash writes "Intel's Haswell architecture is finally available in the flagship Core i7-4770K and Core i7-4950HQ processors. This is a very volatile time for Intel. In an ARM-less vacuum, Intel's Haswell architecture would likely be the most amazing thing to happen to the tech industry in years. Haswell mobile processors are slated to bring about the single largest improvement in battery life in Intel history. In graphics, Haswell completely redefines the expectations for processor graphics. On the desktop however, Haswell is just a bit more efficient, but no longer much faster when going from one generation to another." Reader wesbascas puts some numbers on what "just a bit" means here: "Just as leaked copies of the chip have already shown, the i7-4770K only presents an incremental ~10% performance increase over the Ivy Bridge-based Core i7-3770K. Overclocking potential also remains in the same 4.3 GHz to 4.6 GHz ballpark."

Share on Google+

Read more of this story at Slashdot.



29 May 08:01

Raspberry Pi puts holes in China's Great Firewall

by Phil Muncaster

RPi plus WiFi hotspot plus VPN equals portable censorship destroyer

A tech-savvy China-based Redditor has spotted a hassle-free way of ensuring he or she is always able to bypass the Great Firewall, even when out and about, using the Raspberry Pi to connect to a virtual private network (VPN).…