Article: Blockchain Floated As A Solution For Medical Data Hacks

Blockchain, Cyber-Security, Data

Blockchain Floated As A Solution For Medical Data Hacks

Ally Medina, director of the Blockchain Advocacy Coalition in California, said that using verifiable credentials could be the solution. With this model, patients are the only people with access to information.

Verifiable credentials are the digital form of physical identification. Exchanging health records using verifiable credentials ensures health records have been transferred from doctor to patient. It does not store the record itself, making it an advocated option for new health tech companies.

Third parties holding personal information spark cybersecurity concerns, but verifiable credentials make hacking more difficult. The most recent technology developments are for proof of Covid-19 testing or vaccination.

Read full article

Article: How the open source community helped firms investigate their network activity following SolarWinds

Cyber-Security, Open Source, Software

How the open source community helped firms investigate their network activity following SolarWinds

The ramifications of the SolarWinds attack are still unfolding more than four months since the breaches were revealed to the public. One underappreciated facet of the wide-ranging scandal that has engulfed much of the U.S. government and hundreds of major companies involves the powerful role the open source community played in helping enterprises respond to the crisis, according to Greg Bell, co-founder and CSO of cybersecurity company Corelight.

“What happened with the Sunburst malware is that when FireEye/Mandiant discovered the attack and made this sort of amazingly detailed disclosure, they released information about the attack—so called indicators of compromise—in open formats on GitHub, the platform where open source tools are built and where information is shared,” Bell said.

Read full article

Article: Mission-critical supply chain software: A growing operational priority

Cyber-Security, Open Source, Software, Spectrum

SEC0421-Cyber-Feat-Slide1-900pxMission-critical supply chain software: A growing operational priority

With most companies using open-source code to run large portions of their software applications, it’s clear that securing mission-critical supply chain software is a growing operation priority for companies and organizations across the spectrum. However, the critical question moving forward is – will those companies make the commitment to invest in the technology needed to provide adequate security?

Read full article