Security news that informs and inspires
headshot of Fahmida Y. Rashid with teal overlay

Fahmida Y. Rashid

Contributor

Fahmida brings over a decade of IT security news reporting along with ten years of network administration and software development to Decipher. Every security story has a human face, and her goal is to bring those stories to light. As the senior managing editor of Decipher, she will focus on ways security can impact how people live, work, and play. She enjoys working on stories that speak to those outside the security industry, highlighting the intersection of security and other technology areas. Over the years, she has seen enough to make her overzealous about her personal threat-model, but she doesn’t hold it against anyone for having a more relaxed worldview.

  • fahmida@decipher.sc
  • @FYRashid
  • 3DF6 3FDA FACC 7BC6
352 articles by Fahmida Y. Rashid

Enterprises Lack Clear Security Guidance for 5G

Enterprises need guidance on how to get ready for 5G networks, but the current fear-mongering about Huawei doesn't give enterprises the information they need to make sure the applications are secure.

Networking, Wireless Security, Internet, 5g, Critical Infrastructure Security

GitHub Beefs Up Code Scanning With Semmle

Keeping software secure isn't just the developer's job. GitHub is strengthening its ecosystem with tools for developers, researchers, and project maintainers to identify and fix software vulnerabilities.

Application Security, Open Source, Vulnerability

Tortoiseshell Targets IT Providers in Supply Chain Attack

Supply chain attacks violate the trust organizations have in their suppliers and providers. A newly discovered attack group is brazen, compromising IT providers in order to get to their final targets.

Supply Chain, Attacker

Working Group Attempts Consensus on Encryption, Lawful Access

The "debate" over how law enforcement can have lawful access to encrypted messages is anything but civil. The Encryption Working Group attempted to find common ground and made some proposals, but no agreement on how messages can be viewed without undermining encryption.

Encryption, Government

Attack on Power Utility Highlights Need for Layered Defense

The key takeaway from the NERC report about the attack against a US electric utility isn't that companies need to be patching, but that layered defense is still the best approach for keeping systems and networks safe.

Critical Infrastructure Security