Nathan Eddy Nathan Eddy is a Berlin-based filmmaker and freelance journalist specializing in enterprise IT and security issues, health care IT and architecture.
Nathan Eddy
Building Immunity at AppSec Insertion Points
The fundamentals of a formal, effective application security plan should start with business objectives, tools, processes and most of all, data, with the primary driver for securing applications focused on protecting data. While it is important to surgically address the insecurities in a mission-critical application, it is equally important to ... Read More
Security Boulevard
Report Finds Surge in Malware Aimed at MacOS
Malware targeting Apple’s macOS is on the rise—and fast—according to an investigation by Atlas VPN, which reported 674,273 new malware samples were found in 2020, up from just 56,556 samples detected in 2019. That’s an increase of 1,092%, with malicious actors creating an average of 1,847 threats aimed at Apple’s ... Read More
Security Boulevard
IoT Security in the Wake of the Verkada Breach
The security breach of security camera startup Verkada, which gave hackers access to videos from nearly 150,000 cameras – including those in prisons, schools, hospitals and electric car giant Tesla -means organizations deploying cloud-based IoT devices should give their security plans another look. The hackers were able to gain access ... Read More
Security Boulevard
Patch Management in the Post-SolarWinds Era
The SolarWinds breach, in which hackers inserted malware into software updates sent to thousands of customers and created a backdoor to their IT systems, suggests organizations need to seriously rethink patch management. Until recently, installing patches and keeping systems up to date was purely a risk reduction exercise, but IT ... Read More
Security Boulevard
Secure Offboarding Best Practices
The remote work conditions set up in response to the COVID-19 pandemic resulted in a host of new challenges for IT departments – one that’s often overlooked is securely offboarding employees. It’s an especially tricky task to locate the multiple undocumented points of entry into the organization’s network, especially in ... Read More
Security Boulevard