Do Software Developers Really Care About Information Security

Posted in Implementing Security, Security Awareness on Aug 22, 2016

Software vulnerabilities are one of the biggest security problems faced by organisations; and despite continual improvements in security awareness and software development, the problem persists.

Security Experts You Need to follow

Posted in Security Knowledgebase, Software Development, Popular Posts on Aug 01, 2016

As computers become exponentially more involved in our everyday working lives, security is an increasing concern.

What is Penetration Testing and Why is It Important

Posted in Testing, Popular Posts on Jul 25, 2016

Penetration testing (otherwise known as pentesting) is the process of testing your applications for vulnerabilities, and answering a simple question."What could a hacker do to harm my application, or organisation, out in the real world?"

The importance of testing for application security

Posted in Implementing Security, Strategy, Testing on Jul 18, 2016

Why is testing for application security important? Can't an organisation just respond to an incident if, or when it occurs? Whilst that viewpoint may sound mad to someone security conscious, it is unfortunately the approach that many organisations worldwide still take today.

Action plan to acheive security compliance

Posted in Implementing Security, Security Management, Strategy on Jul 04, 2016

Application security is becoming an increasingly crucial requirement for achieving compliance, and without good application security processes in place across your organisation, you can easily fall down on compliance as a result.

Do you have an application security visibility problem

Posted in Security Awareness, Security Management, Strategy on Jun 28, 2016

How much does your organisation know about the security of the applications it runs and develops? We look at 4 causes of application security visibility problems, in order to protect against vulnerabilities that could put your data at risk.

Conducting a Secure Code Review

Posted in Implementing Security, Strategy, Testing on Jun 03, 2016

With new application security risks emerging all the time, it is vital that your dev team starts to make application security as much of a priority as functionality

How to Respond to Vulnerability Disclosures

Posted in Security Management, Strategy on Jun 01, 2016

In the last couple of years there seems to have been an ever-growing number of high-profile vulnerability disclosures: Heartbleed, GHOST, Shellshock. High-profile vulnerabilities like these shine a spotlight on application security.

Achieving PCI compliance with a third-party service provider

Posted in Security Management, Strategy on May 27, 2016

If you’re working with a third-party service provider, remember it’s still the responsibility of your organisation to ensure that your customers’ data is handled in compliance with PCI DSS standards.

Tips for Implementing Two Factor Authentication (2FA)

Posted in Implementing Security on May 17, 2016

Password security isn't enough to protect your organisation. To secure your data, and ward off attack, it's time to roll-out two factor authentication. Today, we're looking at 5 helpful tips for implementing safe and secure two factor authentication.