Taylor Armerding, The New Stack

Taylor Armerding

The New Stack

Boston, MA, United States

Contact Taylor

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • The New Stack
  • Forbes
  • MultichannelMerchant
  • Naked Security
  • CSOonline
  • Network World
  • CIO.com
  • Computerworld

Past articles by Taylor:

Open Source News from the 2022 OSSRA Report

Open source is everywhere, according to the 2022 OSSRA report. Identifying, tracking, and managing open source is critical for effective software security. → Read More

OWASP Top 10: A Guide to the Worst Software Vulnerabilities

For the first time in four years, the OWASP Top 10 list of web application risks was updated for OWASP's 20th anniversary. → Read More

How to Increase Speed and Security with ASOC

There is no way to cope with modern software development's level of velocity without automating security testing tools. → Read More

Containers Can Be Both Leaky and Risky — But That’s Always Been True –

Security startup Prevasio posted a report analyzing public Docker container images hosted on Docker Hub. It found that 51% had critical vulnerabilities. → Read More

Get Ready For A Ransomware Tsunami

Officials in two Florida cities who paid off ransomware attackers spent a lot less than other cities, like Atlanta and Baltimore, that refused to pay and are spending millions. But the short-term gain may lead to long-term pain, since it will likely produce a spike in similar attacks. → Read More

It's Not Just Autonomous Cars Of The Future That Need Security

Researchers are working feverishly to make the autonomous vehicles of the future secure from cyberattacks. That is obviously a good thing, but the connected cars of today need that kind of security just as much. → Read More

Measuring the Successes and Shortcomings of Software Security in Retail

As an industry, retail’s reputation for providing software security has taken some hits. The top 15 data breaches of the current century include Target in 2013, with account information on an estimated 110 million customers compromised; TJX in 2006, with 94 million credit cards exposed; and Home Depot in September 2014, with about 56 million customer credit/debit cards compromised. → Read More

Measuring the Successes and Shortcomings of Software Security in Retail

As an industry, retail’s reputation for providing software security has taken some hits. The top 15 data breaches of the current century include Target in 2013, with account information on an estimated 110 million customers compromised; TJX in 2006, with 94 million credit cards exposed; and Home Depot in September 2014, with about 56 million customer credit/debit cards compromised. → Read More

Threats Obvious, But Electronic Voter Systems Remain Insecure

U.S. electronic voting systems are demonstrably insecure, even though physical access to them is necessary for most exploits. Still, little has been done to improve things since the 2016 election. So why should voters trust the results? → Read More

'Cyber Pearl Harbor' Unlikely, But Critical Infrastructure Needs Major Upgrade

No, vast swaths of the U.S. are not about to go dark and cold because of a "9/11"-style cyberattack. But the nation's critical infrastructure remains much more vulnerable than it should be, and needs to improve its security - a lot. → Read More

Cybersecurity: Not Just "A" Job

Job prospects in cybersecurity are better than bright - unemployment is in the negative range, with at least a half-million jobs vacant in the U.S. alone. The challenge is not just to fill those jobs, but to fill them with qualified people who reflect the diversity of the workforce. → Read More

Equifax Breach: Catastrophic, But No Game Changer Yet

It's been a year since Equifax acknowledged a catastrophic data breach that compromised the personal information of more than 147 million people. It prompted congressional hearings and investigations. But it hasn't been a game changer, legislatively or in software security. → Read More

House votes for six more years of warrantless surveillance –

If you’re a member of the US “intelligence community” Thursday was a great day for homeland security. Less so if you're a privacy advocate. → Read More

Man charged with spying on thousands of Mac users for 13 years –

The technical description of the “Fruitfly” malware is spyware - but perhaps the term creepware would be more appropriate. → Read More

FBI director says ‘unbreakable encryption is a public safety issue’ –

FBI director Christopher Wray is still fighting for encryption back door → Read More

US tightens rules on border search –

The chances that US border agents will be pulling data from your devices declined this past week - at least by a little. → Read More

Is your Spotify password up to scratch? –

If you’re among the 140 million users who enjoy streaming music from Spotify, you might want to make sure you have a strong password. → Read More

Sensor data can be used to guess your PIN, unlock your phone –

Turns out that those sensors in your smartphone that do all kinds of cool, magical things have a not-so-cool downside. → Read More

Washington DC’s surveillance cameras hacked… to send spam –

Everything and everybody is hackable - and that includes Big Brother → Read More

Coinbase investigates insider trading after Bitcoin Cash price spike –

Trading was suspended after four minutes “to ensure a fair and orderly market.” But things were anything but orderly at that point. → Read More