<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Security Innovation Europe Blog</title>
    <link>http://www.securityinnovationeurope.com/blog</link>
    <description />
    <language>en-us</language>
    <pubDate>Mon, 16 Jan 2017 10:14:29 GMT</pubDate>
    <dc:date>2017-01-16T10:14:29Z</dc:date>
    <dc:language>en-us</dc:language>
    <item>
      <title>How to Improve Security's Reputation Within Your Organisation</title>
      <link>http://www.securityinnovationeurope.com/blog/how-to-improve-securitys-reputation-within-your-organisation-0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/how-to-improve-securitys-reputation-within-your-organisation-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/Improve_Security_Reputation.jpg?t=1488899202616" alt="Improve_Security_Reputation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Within many organisations, security gets a bad rep. Even with top-tier talent manning your security team, there are a handful of wider issues that limit their ability to improve the overall security of the organisation.&lt;/p&gt; 
&lt;p&gt;Thankfully, all is not lost. Security’s poor reputation usually stems from a lack of education; and by understanding the cyclical process that interferes with &lt;a href="/blog/the-importance-of-testing-for-application-security"&gt;secure application development&lt;/a&gt;, you can take major steps to improve security’s reputation within your organisation.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/how-to-improve-securitys-reputation-within-your-organisation-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/Improve_Security_Reputation.jpg?t=1488899202616" alt="Improve_Security_Reputation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Within many organisations, security gets a bad rep. Even with top-tier talent manning your security team, there are a handful of wider issues that limit their ability to improve the overall security of the organisation.&lt;/p&gt; 
&lt;p&gt;Thankfully, all is not lost. Security’s poor reputation usually stems from a lack of education; and by understanding the cyclical process that interferes with &lt;a href="/blog/the-importance-of-testing-for-application-security"&gt;secure application development&lt;/a&gt;, you can take major steps to improve security’s reputation within your organisation.&lt;/p&gt;    
&lt;img src="http://track.hubspot.com/__ptq.gif?a=355303&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.securityinnovationeurope.com%2Fblog%2Fhow-to-improve-securitys-reputation-within-your-organisation-0&amp;amp;bu=http%253A%252F%252Fwww.securityinnovationeurope.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Management</category>
      <category>Software Development</category>
      <category>Implementing Security</category>
      <pubDate>Mon, 16 Jan 2017 09:59:12 GMT</pubDate>
      <author>mdunlop@securityinnovationeurope.com (Marc Dunlop)</author>
      <guid>http://www.securityinnovationeurope.com/blog/how-to-improve-securitys-reputation-within-your-organisation-0</guid>
      <dc:date>2017-01-16T09:59:12Z</dc:date>
    </item>
    <item>
      <title>Why Organisations Should Run Security Tests More Often</title>
      <link>http://www.securityinnovationeurope.com/blog/why-organisations-should-run-security-tests-more-often-0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/why-organisations-should-run-security-tests-more-often-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hs-fs/hub/355303/file-2243246957-png/blog/security-test-frequency.png?t=1488899202616" alt="security-test-frequency" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Many organisations stick to a rigid process of security testing, running costly manual tests on an infrequent basis. Whilst a handful of critical applications &lt;em&gt;do&lt;/em&gt; require in-depth security testing, most applications would benefit from a more frequent, but less resource-intensive, approach to security.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/why-organisations-should-run-security-tests-more-often-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hs-fs/hub/355303/file-2243246957-png/blog/security-test-frequency.png?t=1488899202616" alt="security-test-frequency" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Many organisations stick to a rigid process of security testing, running costly manual tests on an infrequent basis. Whilst a handful of critical applications &lt;em&gt;do&lt;/em&gt; require in-depth security testing, most applications would benefit from a more frequent, but less resource-intensive, approach to security.&lt;/p&gt;    
&lt;img src="http://track.hubspot.com/__ptq.gif?a=355303&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.securityinnovationeurope.com%2Fblog%2Fwhy-organisations-should-run-security-tests-more-often-0&amp;amp;bu=http%253A%252F%252Fwww.securityinnovationeurope.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Implementing Security</category>
      <pubDate>Mon, 09 Jan 2017 05:31:00 GMT</pubDate>
      <author>mdunlop@securityinnovationeurope.com (Marc Dunlop)</author>
      <guid>http://www.securityinnovationeurope.com/blog/why-organisations-should-run-security-tests-more-often-0</guid>
      <dc:date>2017-01-09T05:31:00Z</dc:date>
    </item>
    <item>
      <title>Why Shelfware Means Secure Development Processes Are Vital</title>
      <link>http://www.securityinnovationeurope.com/blog/why-shelfware-means-secure-development-processes-are-vital-0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/why-shelfware-means-secure-development-processes-are-vital-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/Shelfware_and_Secure_Development_Processes.jpg?t=1488899202616" alt="Shelfware_and_Secure_Development_Processes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Shelfware (purchased software that quickly ends up shelved and unused) is a huge problem for large organisations, especially those attempting to rollout security programs.&lt;/p&gt; 
&lt;p&gt;In order to overcome the hurdle of shelfware, and ensure that your &lt;a href="/blog/how-much-does-developer-security-training-really-cost"&gt;next security investment &lt;/a&gt;translates into meaningful security improvements, it’s vital to understand the relationship between application security tools, and &lt;a href="/blog/how-to-enforce-developer-security-training"&gt;developer security training&lt;/a&gt;.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/why-shelfware-means-secure-development-processes-are-vital-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/Shelfware_and_Secure_Development_Processes.jpg?t=1488899202616" alt="Shelfware_and_Secure_Development_Processes" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Shelfware (purchased software that quickly ends up shelved and unused) is a huge problem for large organisations, especially those attempting to rollout security programs.&lt;/p&gt; 
&lt;p&gt;In order to overcome the hurdle of shelfware, and ensure that your &lt;a href="/blog/how-much-does-developer-security-training-really-cost"&gt;next security investment &lt;/a&gt;translates into meaningful security improvements, it’s vital to understand the relationship between application security tools, and &lt;a href="/blog/how-to-enforce-developer-security-training"&gt;developer security training&lt;/a&gt;.&lt;/p&gt;    
&lt;img src="http://track.hubspot.com/__ptq.gif?a=355303&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.securityinnovationeurope.com%2Fblog%2Fwhy-shelfware-means-secure-development-processes-are-vital-0&amp;amp;bu=http%253A%252F%252Fwww.securityinnovationeurope.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Software Development</category>
      <pubDate>Mon, 12 Dec 2016 08:56:35 GMT</pubDate>
      <author>mdunlop@securityinnovationeurope.com (Marc Dunlop)</author>
      <guid>http://www.securityinnovationeurope.com/blog/why-shelfware-means-secure-development-processes-are-vital-0</guid>
      <dc:date>2016-12-12T08:56:35Z</dc:date>
    </item>
    <item>
      <title>8 Essential Components of an Effective Security Awareness Curriculum</title>
      <link>http://www.securityinnovationeurope.com/blog/8-essential-components-of-an-effective-security-awareness-curriculum-0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/8-essential-components-of-an-effective-security-awareness-curriculum-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/8_Essential_Components_of_an_Effective_Security_Awareness_Curriculum.jpg?t=1488899202616" alt="8_Essential_Components_of_an_Effective_Security_Awareness_Curriculum" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;A security awareness curriculum is the vital first step in improving your security, helping you to raise &lt;a href="/blog/how-to-achieve-organisation-wide-security-awareness"&gt;organisation-wide awareness&lt;/a&gt; of the threats faced by your employees and business on a day-to-day basis.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/8-essential-components-of-an-effective-security-awareness-curriculum-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/8_Essential_Components_of_an_Effective_Security_Awareness_Curriculum.jpg?t=1488899202616" alt="8_Essential_Components_of_an_Effective_Security_Awareness_Curriculum" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;A security awareness curriculum is the vital first step in improving your security, helping you to raise &lt;a href="/blog/how-to-achieve-organisation-wide-security-awareness"&gt;organisation-wide awareness&lt;/a&gt; of the threats faced by your employees and business on a day-to-day basis.&lt;/p&gt;    
&lt;img src="http://track.hubspot.com/__ptq.gif?a=355303&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.securityinnovationeurope.com%2Fblog%2F8-essential-components-of-an-effective-security-awareness-curriculum-0&amp;amp;bu=http%253A%252F%252Fwww.securityinnovationeurope.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Awareness</category>
      <pubDate>Tue, 29 Nov 2016 10:43:16 GMT</pubDate>
      <author>mdunlop@securityinnovationeurope.com (Marc Dunlop)</author>
      <guid>http://www.securityinnovationeurope.com/blog/8-essential-components-of-an-effective-security-awareness-curriculum-0</guid>
      <dc:date>2016-11-29T10:43:16Z</dc:date>
    </item>
    <item>
      <title>6 Reasons All Application Developers Need a Training Knowledgebase</title>
      <link>http://www.securityinnovationeurope.com/blog/6-reasons-all-application-developers-need-a-training-knowledgebase-0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/6-reasons-all-application-developers-need-a-training-knowledgebase-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/blog/6_Reasons_All_Application_Developers_Need_a_Training_Knowledgebase.jpg?t=1488899202616" alt="security knowledgebase" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;There's a missing link in&amp;nbsp;your application security: a training knowledgebase. To help improve the efficacy of your security training roll-out, I'm exploring the purpose of a knowledgebase - and looking at six reasons for implementing one in your organisation.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/6-reasons-all-application-developers-need-a-training-knowledgebase-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/blog/6_Reasons_All_Application_Developers_Need_a_Training_Knowledgebase.jpg?t=1488899202616" alt="security knowledgebase" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;There's a missing link in&amp;nbsp;your application security: a training knowledgebase. To help improve the efficacy of your security training roll-out, I'm exploring the purpose of a knowledgebase - and looking at six reasons for implementing one in your organisation.&lt;/p&gt;    
&lt;img src="http://track.hubspot.com/__ptq.gif?a=355303&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.securityinnovationeurope.com%2Fblog%2F6-reasons-all-application-developers-need-a-training-knowledgebase-0&amp;amp;bu=http%253A%252F%252Fwww.securityinnovationeurope.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Mon, 21 Nov 2016 08:25:24 GMT</pubDate>
      <author>mdunlop@securityinnovationeurope.com (Marc Dunlop)</author>
      <guid>http://www.securityinnovationeurope.com/blog/6-reasons-all-application-developers-need-a-training-knowledgebase-0</guid>
      <dc:date>2016-11-21T08:25:24Z</dc:date>
    </item>
    <item>
      <title>Does It Actually Matter If Software is Built Securely?</title>
      <link>http://www.securityinnovationeurope.com/blog/does-it-actually-matter-if-software-is-built-securely-0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/does-it-actually-matter-if-software-is-built-securely-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hs-fs/hub/355303/file-968379686-png/blog/secure-software.png?t=1488899202616" alt="secure-software" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Don't bite my head off just yet.&lt;/p&gt; 
&lt;p&gt;Entertain the thought. Does it really matter if software is built securely?&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Do organisation's need to worry about ensuring that their software is developed securely in the first place, or can they just protect against attacks by employing the latest technology: web application firewalls, application delivery controllers, automated scanners, and so forth?&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/does-it-actually-matter-if-software-is-built-securely-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hs-fs/hub/355303/file-968379686-png/blog/secure-software.png?t=1488899202616" alt="secure-software" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Don't bite my head off just yet.&lt;/p&gt; 
&lt;p&gt;Entertain the thought. Does it really matter if software is built securely?&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Do organisation's need to worry about ensuring that their software is developed securely in the first place, or can they just protect against attacks by employing the latest technology: web application firewalls, application delivery controllers, automated scanners, and so forth?&amp;nbsp;&lt;/p&gt;    
&lt;img src="http://track.hubspot.com/__ptq.gif?a=355303&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.securityinnovationeurope.com%2Fblog%2Fdoes-it-actually-matter-if-software-is-built-securely-0&amp;amp;bu=http%253A%252F%252Fwww.securityinnovationeurope.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Mon, 14 Nov 2016 11:02:20 GMT</pubDate>
      <author>mdunlop@securityinnovationeurope.com (Marc Dunlop)</author>
      <guid>http://www.securityinnovationeurope.com/blog/does-it-actually-matter-if-software-is-built-securely-0</guid>
      <dc:date>2016-11-14T11:02:20Z</dc:date>
    </item>
    <item>
      <title>3 Things Secure Application Developers Need From Your Security Team</title>
      <link>http://www.securityinnovationeurope.com/blog/3-things-secure-application-developers-need-from-your-security-team-0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/3-things-secure-application-developers-need-from-your-security-team-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/blog/3_Things_Secure_Application_Developers_Need_From_Your_Security_Team.jpg?t=1488899202616" alt="application security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Struggling to improve your application security?&lt;br&gt;&lt;br&gt;In most organisations, there's a serious disconnect between developers&amp;nbsp;and security. Both teams work hard at their respective&amp;nbsp;roles, but without the time and infrastructure necessary for effective collaboration,&amp;nbsp;a significant&amp;nbsp;amount of bugs and vulnerabilities make it into finished applications.&lt;/p&gt; 
&lt;p&gt;To help you improve your application security, and reduce the costs of remediation, I'm looking at 3 things secure developers need from your security team.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/3-things-secure-application-developers-need-from-your-security-team-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/blog/3_Things_Secure_Application_Developers_Need_From_Your_Security_Team.jpg?t=1488899202616" alt="application security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Struggling to improve your application security?&lt;br&gt;&lt;br&gt;In most organisations, there's a serious disconnect between developers&amp;nbsp;and security. Both teams work hard at their respective&amp;nbsp;roles, but without the time and infrastructure necessary for effective collaboration,&amp;nbsp;a significant&amp;nbsp;amount of bugs and vulnerabilities make it into finished applications.&lt;/p&gt; 
&lt;p&gt;To help you improve your application security, and reduce the costs of remediation, I'm looking at 3 things secure developers need from your security team.&lt;/p&gt;    
&lt;img src="http://track.hubspot.com/__ptq.gif?a=355303&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.securityinnovationeurope.com%2Fblog%2F3-things-secure-application-developers-need-from-your-security-team-0&amp;amp;bu=http%253A%252F%252Fwww.securityinnovationeurope.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Software Development</category>
      <category>Implementing Security</category>
      <pubDate>Mon, 07 Nov 2016 16:04:00 GMT</pubDate>
      <author>mdunlop@securityinnovationeurope.com (Marc Dunlop)</author>
      <guid>http://www.securityinnovationeurope.com/blog/3-things-secure-application-developers-need-from-your-security-team-0</guid>
      <dc:date>2016-11-07T16:04:00Z</dc:date>
    </item>
    <item>
      <title>How to Manage DDOS Attacks Against Your Organisation</title>
      <link>http://www.securityinnovationeurope.com/blog/how-to-manage-ddos-attacks-against-your-organisation-0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/how-to-manage-ddos-attacks-against-your-organisation-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hs-fs/hub/355303/file-963762387-png/blog/ddos-attack.png?t=1488899202616" alt="ddos-attack" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Are you struggling with repeated DDOS attacks against your organisation?&lt;/p&gt; 
&lt;p&gt;Not sure on the best way to move forward, or how to prevent them in the future?&lt;/p&gt; 
&lt;p&gt;Perhaps you just want to ensure that your organisation has the right processes in place to minimise a future attack's impact?&lt;/p&gt; 
&lt;p&gt;You'll want to read on.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/how-to-manage-ddos-attacks-against-your-organisation-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hs-fs/hub/355303/file-963762387-png/blog/ddos-attack.png?t=1488899202616" alt="ddos-attack" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;Are you struggling with repeated DDOS attacks against your organisation?&lt;/p&gt; 
&lt;p&gt;Not sure on the best way to move forward, or how to prevent them in the future?&lt;/p&gt; 
&lt;p&gt;Perhaps you just want to ensure that your organisation has the right processes in place to minimise a future attack's impact?&lt;/p&gt; 
&lt;p&gt;You'll want to read on.&lt;/p&gt;    
&lt;img src="http://track.hubspot.com/__ptq.gif?a=355303&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.securityinnovationeurope.com%2Fblog%2Fhow-to-manage-ddos-attacks-against-your-organisation-0&amp;amp;bu=http%253A%252F%252Fwww.securityinnovationeurope.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Mon, 31 Oct 2016 09:18:42 GMT</pubDate>
      <author>mdunlop@securityinnovationeurope.com (Marc Dunlop)</author>
      <guid>http://www.securityinnovationeurope.com/blog/how-to-manage-ddos-attacks-against-your-organisation-0</guid>
      <dc:date>2016-10-31T09:18:42Z</dc:date>
    </item>
    <item>
      <title>4 Ways to Get Your Dev Team to Buy in to Your Application Security Program</title>
      <link>http://www.securityinnovationeurope.com/blog/4-ways-to-get-your-dev-team-to-buy-in-to-your-application-security-program-0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/4-ways-to-get-your-dev-team-to-buy-in-to-your-application-security-program-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/blog/4_Ways_to_Get_Your_Dev_Team_to_Buy_in_to_Your_Application_Security_Program.jpg?t=1488899202616" alt="4_Ways_to_Get_Your_Dev_Team_to_Buy_in_to_Your_Application_Security_Program.jpg" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;When you’re looking to improve application security within your organisation, it’s important to get buy-in across the company. You need to create a culture that prioritises security. However, it can be hard for developers to prioritise security, as they are judged on the functionality rather than the security of their code.&lt;/p&gt; 
&lt;p&gt;So today I’m looking at 4 ways to get buy-in from your dev team to help them prioritise application security as much as the rest of your organisation.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/4-ways-to-get-your-dev-team-to-buy-in-to-your-application-security-program-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/blog/4_Ways_to_Get_Your_Dev_Team_to_Buy_in_to_Your_Application_Security_Program.jpg?t=1488899202616" alt="4_Ways_to_Get_Your_Dev_Team_to_Buy_in_to_Your_Application_Security_Program.jpg" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;When you’re looking to improve application security within your organisation, it’s important to get buy-in across the company. You need to create a culture that prioritises security. However, it can be hard for developers to prioritise security, as they are judged on the functionality rather than the security of their code.&lt;/p&gt; 
&lt;p&gt;So today I’m looking at 4 ways to get buy-in from your dev team to help them prioritise application security as much as the rest of your organisation.&lt;/p&gt;    
&lt;img src="http://track.hubspot.com/__ptq.gif?a=355303&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.securityinnovationeurope.com%2Fblog%2F4-ways-to-get-your-dev-team-to-buy-in-to-your-application-security-program-0&amp;amp;bu=http%253A%252F%252Fwww.securityinnovationeurope.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Management</category>
      <category>Software Development</category>
      <pubDate>Tue, 18 Oct 2016 08:03:01 GMT</pubDate>
      <author>mdunlop@securityinnovationeurope.com (Marc Dunlop)</author>
      <guid>http://www.securityinnovationeurope.com/blog/4-ways-to-get-your-dev-team-to-buy-in-to-your-application-security-program-0</guid>
      <dc:date>2016-10-18T08:03:01Z</dc:date>
    </item>
    <item>
      <title>Should Your Organisation Be Worried About Ransomware?</title>
      <link>http://www.securityinnovationeurope.com/blog/should-your-organisation-be-worried-about-ransomware-0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/should-your-organisation-be-worried-about-ransomware-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/blog/Should_Your_Organisation_Be_Worried_About_Ransomware.jpg?t=1488899202616" alt="Should_Your_Organisation_Be_Worried_About_Ransomware.jpg" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;There's a new&amp;nbsp;threat facing your organisation.&lt;/p&gt; 
&lt;p&gt;It uses&amp;nbsp;never before seen tactics to get straight to the heart of your secure systems; compromising your valuable&amp;nbsp;data and attempting to exploit your organisation for thousands of pounds.&lt;/p&gt; 
&lt;p&gt;Today, we're looking at the growing problem posed by ransomware - and offering a few actionable steps your organisation can take to protect itself against this new threat.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="http://www.securityinnovationeurope.com/blog/should-your-organisation-be-worried-about-ransomware-0" title="" class="hs-featured-image-link"&gt; &lt;img src="http://www.securityinnovationeurope.com/hubfs/blog/Should_Your_Organisation_Be_Worried_About_Ransomware.jpg?t=1488899202616" alt="Should_Your_Organisation_Be_Worried_About_Ransomware.jpg" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;    
&lt;p&gt;There's a new&amp;nbsp;threat facing your organisation.&lt;/p&gt; 
&lt;p&gt;It uses&amp;nbsp;never before seen tactics to get straight to the heart of your secure systems; compromising your valuable&amp;nbsp;data and attempting to exploit your organisation for thousands of pounds.&lt;/p&gt; 
&lt;p&gt;Today, we're looking at the growing problem posed by ransomware - and offering a few actionable steps your organisation can take to protect itself against this new threat.&lt;/p&gt;    
&lt;img src="http://track.hubspot.com/__ptq.gif?a=355303&amp;amp;k=14&amp;amp;r=http%3A%2F%2Fwww.securityinnovationeurope.com%2Fblog%2Fshould-your-organisation-be-worried-about-ransomware-0&amp;amp;bu=http%253A%252F%252Fwww.securityinnovationeurope.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Management</category>
      <category>Security Awareness</category>
      <category>ransomeware</category>
      <pubDate>Mon, 03 Oct 2016 17:08:00 GMT</pubDate>
      <author>mdunlop@securityinnovationeurope.com (Marc Dunlop)</author>
      <guid>http://www.securityinnovationeurope.com/blog/should-your-organisation-be-worried-about-ransomware-0</guid>
      <dc:date>2016-10-03T17:08:00Z</dc:date>
    </item>
  </channel>
</rss>