Ransomeware

Security Experts You Need to follow

Posted in Security Knowledgebase, Software Development, Popular Posts on Aug 01, 2016

As computers become exponentially more involved in our everyday working lives, security is an increasing concern.

The importance of testing for application security

Posted in Implementing Security, Strategy, Testing on Jul 18, 2016

Why is testing for application security important? Can't an organisation just respond to an incident if, or when it occurs? Whilst that viewpoint may sound mad to someone security conscious, it is unfortunately the approach that many organisations worldwide still take today.

Action plan to acheive security compliance

Posted in Implementing Security, Security Management, Strategy on Jul 04, 2016

Application security is becoming an increasingly crucial requirement for achieving compliance, and without good application security processes in place across your organisation, you can easily fall down on compliance as a result.

Do you have an application security visibility problem

Posted in Security Awareness, Security Management, Strategy on Jun 28, 2016

How much does your organisation know about the security of the applications it runs and develops? We look at 4 causes of application security visibility problems, in order to protect against vulnerabilities that could put your data at risk.

Conducting a Secure Code Review

Posted in Implementing Security, Strategy, Testing on Jun 03, 2016

With new application security risks emerging all the time, it is vital that your dev team starts to make application security as much of a priority as functionality

How to Respond to Vulnerability Disclosures

Posted in Security Management, Strategy on Jun 01, 2016

In the last couple of years there seems to have been an ever-growing number of high-profile vulnerability disclosures: Heartbleed, GHOST, Shellshock. High-profile vulnerabilities like these shine a spotlight on application security.

Achieving PCI compliance with a third-party service provider

Posted in Security Management, Strategy on May 27, 2016

If you’re working with a third-party service provider, remember it’s still the responsibility of your organisation to ensure that your customers’ data is handled in compliance with PCI DSS standards.

Tips for Implementing Two Factor Authentication (2FA)

Posted in Implementing Security on May 17, 2016

Password security isn't enough to protect your organisation. To secure your data, and ward off attack, it's time to roll-out two factor authentication. Today, we're looking at 5 helpful tips for implementing safe and secure two factor authentication.

How to Ensure Rush to Release Doesn’t Compromise Application Security

Posted in Software Development on Apr 28, 2016

A study by the Ponemon Institute revealed that 58% of respondents believed their organisations are under pressure to release new apps quickly, so how can your organisation meet release pressures without compromising your security?

Busting 5 Myths of application security

Posted in Implementing Security on Mar 30, 2016

Busting 5 common myths about application security, to help your organisation protect its sensitive data.