Quick Wins for Application Security There are two major things your organisation can do to improve its application security: improve the security of applications you use, and improve the security of applications you develop. What a security breach can do to reputation Every organisation is exposed to information security risk, but many still only deal with security issues after a breach has occurred, rather than being proactive. What is social engineering And why should organisations care? Put simply, social engineering is the art of manipulating people into doing something. Reduce The Risk of Common Wifi Security Threats Many people don’t think much about security when they connect to new networks, and the potential implications. Proof of the Need for Mobile Application Security Good application security training is a crucial first step to improving your organisation’s application security. Today, We’re looking at 6 statistics that demonstrate why application security training is essential for protecting your organisation and its data. How to align security and development teams If collaboration between the security and development teams is ineffective, serious vulnerabilities will still make it into your organisation’s finished applications. Poor software release management creates security nightmares There are myriad factors that can influence when new software and software updates are released. Often, release schedules are determined in response to software-hungry consumers, competitor strategies, or the increasing pace of hardware development. Improve the AppSec Risk Management Process A structured risk management process is necessary to join up security activity across your organisation. Here are 4 ways to improve your organisation’s AppSec risk management process. How to Secure the 7 Stages of the SDLC Security best practices can be the first thing to slip when your developer team is up against tight deadlines. How to Decide Which Software Vulnerabilities to Fix First Software applications are susceptible to a diverse array of vulnerabilities, each posing a unique set of problems, it can be difficult for development teams to decide on the right course of action. 1 2 3 4 5 6 7 8 9 10 11 12 13 ← Prev Next →