Skip to main content

Week 1 Blog: Hiya!

Hello, my name is Kailei H. I'm the lovely writer you'll be reading when you come to "Hack what your momma gave you." This blog will be about two things- application security and risk management. Additionally, it might be used to document my development as a security professional. 
Recently, I decided to informally research application security. This topic peaked my interest as I'm unfamiliar with this given the nature of how my company handles security. We haven't done a bunch of work around secure coding and how vulnerable the actual apps are, especially given we do in-house coding for our ERP system. 
The key thing I've discovered is that we need to have the data classified and tagged as such. The type of security you used and developed with app depends on this so you can't use the principle of least privilege when it comes to access controls. "Based on the classification of the data being processed by the application, suitable authentication, authorization, and protection of data in storage or transit should be designed for the application in addition to carrying out secure coding" (Chakraborty, 2017). 

Additionally, this provides some additional benefits. This allows the apps to be developed for exclusive use on various platforms thus allowing the use of the built-in security features (Ashbel, 2017). This is interesting to me especially as the trend grows to move to various cloud-based solutions and allowing mobile devices to perform work. 

References:

Ashbel, A. (2017, May 05). The importance of application security in an increasingly connected world. Retrieved November 30, 2017, from https://www.scmagazineuk.com/the-importance-of-application-security-in-an-increasingly-connected-world/article/651314/

Chakraborty, M. (2017, October 25). Application Security vs. Software Security: What's the Difference? | Synopsys. Retrieved November 30, 2017, from https://www.synopsys.com/blogs/software-security/application-security-vs-software-security/

Comments

Popular posts from this blog

Week 6: Spectre and Meltdown Fallout Continues.

By this time, many of you have heard about the Spectre and Meltdown vulnerabilities of which a lot of machines are susceptible. Most of the major parties involved have provided fixes through various patching means. However, there is still significant fallout due to this gap. Intel is now reporting their firmware patch is causing updates on some of the new chips they have produced. "Firmware updates were causing problems with Ivy Bridge, Sandy Bridge, Skylake and Kaby Lake." (Schwartz, 2018) This flaw is causing frequent reboots and instability in those chips. Additionally, Intel is behind in getting their firmware updates to the various vendors. Some of the major brands which are affected by these gaps are still feeling their way around this and trying to ensure they patch appropriately. It is likely we will see higher than normal OS updates for most folks when it comes to their computers, tablets, and smartphones. However, the big concern and part of the reason this g...

Week 2 Blog: Apple's Recent Software Security Issues

Recently, my favorite tech company has been in the news for some very significant security gaps in their applications. Apple has long been branded as very secure software. Frequently, people will say they just don't get a virus. However, there was a security gap that impacted the Macs, which were using their latest software - High Sierra. This vulnerability allowed root access to any machine running this software. Various sites such as "The Verge" indicate using root to access these machines allow elevated privileges on the machine. It could be used to change Apple ID emails as well as user passwords. The gap presented a huge dent in Apple's reputation on security. Part of it was the way it was announced- the person who discovered the vulnerability publicly disclosed it on twitter. Interesting enough, Apple has a bug detection program in which they pay for any gaps in their software. Even more recently, a new vulnerability was discovered in Apple's Home Kit...

What is leadership anyways?

Security Leadership is what precisely? I ask the question because it is a concept I am wrestling with at this time. What does it mean to be a security leader? Is it merely leading a security department as an information security manager or at the enterprise level as a chief information security officer or chief security officer? Is it influencing an organization's security posture without having an official title? Ultimately, leadership is about people. They said leadership is about getting people to work toward a common goal. The question is, are folks in those roles business leaders who are leading a technical portfolio, or are they technical leaders who enable the business to accomplish their goals? It is likely security leaders are both, and often need to be both. They're technical leaders and business leaders. However, they require different leadership skills to be successful. The additional factor is what is the senior leadership need from their senior security...