Security Management

  • The Impact of BYOD on Organisation Security

    Do you login to your business email account on your personal mobile? Do work on a personal laptop? Access company software from your tablet? More info…

    Posted in Security Awareness, Security Strategy on Nov 07, 2016

  • What is The Difference Between Hashing and Encrypting

    Hashing and encrypting are two words that are often used interchangeably, but incorrectly so. Do you understand the difference between the two, and the situations in which you should use one over the other? In today’s post I investigate the key differences between hashing and encrypting, and when each one is appropriate. More info…

    Posted in Implementing Security, Popular Posts on Oct 31, 2016

  • Five Reasons Executives are Blind to Application Security Risks

    Security Innovation and The Ponemon Institute does a regular study, called The State of Application Security. This study investigates the difference in application security beliefs between developers, security professionals and company executives. The results are pretty shocking. More info…

    Posted in Implementing Security, Security Management on Oct 24, 2016

  • Information Security Mistakes Employees Make

    Not all security breaches happen because of malicious intent. Some of the most common security issues are caused by bad habits ingrained in employees’ day-to-day routines. Thankfully, these potential threats and vulnerabilities are possible to reduce. More info…

    Posted in Security Awareness on Oct 17, 2016

  • Why You Need to Measure Your Application Security Program

    If you aren’t measuring your efforts by tracking and analysing your results, you will end up with an incomplete and ineffective program, without the support, funds or focus required to protect your organisation against security breaches. More info…

    Posted in Security Awareness on Oct 10, 2016

  • 4-Step’s for Application Security Compliance

    Application security is becoming an increasingly crucial requirement for achieving compliance, and without good application security processes in place across your organisation, you can easily fall down on compliance as a result. Here we look at a 4-step action plan to achieve application security compliance. More info…

    Posted in Security Management, Security Strategy on Oct 03, 2016

  • 40 Blogs Every Software Developer Should Be Reading

    Software developers always need to be upskilling, and increasingly are expected to bring more than just great code to an organisation. There’s hundreds of blogs software developers can read to learn, but it’s difficult knowing where to begin (or even what’s worth reading). More info…

    Posted in Software Development, Popular Posts on Sep 26, 2016

  • How Important is Role Specific Developer Security Training

    Most developers specialise in a specific aspect of software and application development; each with their own set of unique benefits and potential security vulnerabilities. More info…

    Posted in Implementing Security, Security Management, Data Security Training on Sep 19, 2016

  • How to Train Secure Web Application Developers

    To ensure that your development team understand the risks associated with web application development, and are armed with the tools to protect your organisation against them, you need to understand how to train secure web developers. More info…

    Posted in Security Management, Software Development, Data Security Training on Sep 12, 2016

  • Website Security Issues Your Company May Be Ignoring

    Website security can be a big problem for businesses. Your website faces the threat of attack from hundreds of different sources; and without the proper action, you’re likely to find your website breached, and your data compromised. More info…

    Posted in Security Management, Security Strategy on Sep 05, 2016