Recent Blog Posts

Intel IoT Delivers the “Ultimate Store Experience” to Retailers at NRF15

Attendees at the National Retail Federation (NRF) Big Conference in New York this month saw first-hand how Intel has become a world leader in delivering a personalized retail experience based on Internet of Things solutions. From the hugely popular Memory … Read more >

The post Intel IoT Delivers the “Ultimate Store Experience” to Retailers at NRF15 appeared first on IoT@Intel.

Read more >

Mobile Allows Doctors to Answer, ‘How Did You Do This Week?’



Mobile devices and technology have allowed clinicians to gather patient data at the point-of-care, access vital information on the go, and untether from traditional wired health IT infrastructures. One hidden benefit of mobile capability is how doctors can gain access to data which analyzes their own performances.


In the video above, Jeff Zavaleta, MD, chief medical officer at Graphium Health and a practicing anesthesiologist in Dallas, shares his insight on how mobile devices offer a new opportunity for practitioners to self-evaluate, answer the question, “how did you do this week?,” and see key performance indicators such as their average patient recovery times and on-time appointment starts.

 

Watch the short video and let us know what questions you have about the future of mobile health IT and where you think it’s headed. How are you using mobile technology to improve your practice?

 

Also, be on the lookout for new blogs from Dr. Zavaleta, who will be a guest contributor to the Intel Health & Life Sciences Community.

 

Read more >

Intel Supports Innovative Payment Reform for Healthcare Services

By Alice Borrelli, director of Global Heath Policy for Intel Intel recognizes the importance of innovative payment models as a way to improve the US healthcare system and applauds Secretary Burwell’s announcement that the Department of Health and Human Services … Read more >

The post Intel Supports Innovative Payment Reform for Healthcare Services appeared first on Policy@Intel.

Read more >

Teamwork, IOT Technology Lead to Real-World Smart Building Success

With approximately 47,000 buildings in Manhattan alone, it’s easy to contemplate how smart building solutions—a combination of elements including Building Management Systems (BMS), sensors, control systems, and big data that improves productivity and efficiency in large properties—can create huge value … Read more >

The post Teamwork, IOT Technology Lead to Real-World Smart Building Success appeared first on IoT@Intel.

Read more >

Maximize Your 2015 New Year’s Resolution Success with an Intel-Powered Tablet

With 2015 in full swing, many of us are holding onto our resolutions, promising we will at least carry them into February. In recent years, technology has played a more central role in helping us keep our resolutions. From fitness … Read more >

The post Maximize Your 2015 New Year’s Resolution Success with an Intel-Powered Tablet appeared first on Technology@Intel.

Read more >

More Secure Programming – Where to Begin with Static Code Analysis

Code.jpgIdentifying and correcting security vulnerabilities in applications has become more increasingly vital with Static Code Analysis tools in conjunction with manual code reviews. Static Code Analysis includes an automated software tool that examines a program’s source code without actually executing it. This type of analysis is used to identify different kinds of security issues, obscure logic problems, bugs and defects, and more. Even more importantly, it is becoming common to have an organizational policy that includes the requirement. It is already a compliance requirement for organizations that must comply with Payment Application Data Security Standard (PCI PADSS).

 

There are a plethora of vendors with static code analysis tools that we won’t be comparing here but rest assured the most common development languages are supported. These tools can be very helpful in determining adherence to secure coding standards. But one of the biggest challenges to getting started is the shock of a report after an initial codebase is analyzed. There could be tens of thousands of issues found when an analysis is completed for a large codebase that has never been scanned before. Going through the static code analysis report can be beneficial in helping to identify high risk security areas but can also be time consuming to research what may result in false alarms. Either way, the effort must be made to review such a report as it helps demonstrate due diligence by documenting the review of potential vulnerabilities. For the software engineer being asked to address issues found in a large legacy code base, it can present more stress added on to the workload for developing the next release.

 

If a threat model was completed during the design phase of the application development, it can help to describe the security objectives or privacy requirements for the application and how those objectives mitigate threats in possible misuse or abuse cases. The main focus should have been on protecting the system and the information being processed. Furthermore, an attack surface analysis helps with defining how an external adversary may attempt to attack the application and focuses more on the high risk areas where there may be more exposure such as Internet connected interfaces. If these tools were not used during the development phase, maybe other types of risk based approaches provided the same result. But if not, it’s advisable to start having these conversations with all stakeholders so that the security objectives and attack surface mitigations can be well defined. It’s likely that an Advance Persistent Threat (APT), albeit with limited knowledge of the system, would use similar tools when attempting to identify an application’s potential weaknesses for the purpose of exploiting them.

 

Requirement for static code analysis has become more commonly integrated into an organizations secure application development processes and it helps with adherence to ISO 27034. It’s also advisable to integrate Threat Modeling and Attack Surface Analysis into the lifecycle as well. These tools are helpful in prioritization efforts so that identified issues in static code analysis reports can be focused on the most important security features of an application first. This will undoubtedly help the security reviewer gain traction on an effort that may seem overwhelming at first.

 

 

Find Andy on LinkedIn

See previous content from Andy_Good 

Start a conversation with Andy on Twitter

 

 

 

Read more >