-
How to Identify Secure Software Vendors
You can invest all the time and money in the world ensuring that your internal systems are safe and secure, but with more and more third party vendors being used each year, it’s all for nothing if they’re not secure too.. Read more…
Posted in Implementing Security
-
What is The Difference Between Hashing and Encrypting
Hashing and encrypting are two words that are often used interchangeably, but incorrectly so. Do you understand the difference between the two, and the situations in which you should use one over the other? In today’s post I investigate the key differences between hashing and encrypting, and when each one is appropriate.. Read more…
Posted in Implementing Security, Popular Posts
-
Five Reasons Executives are Blind to Application Security Risks
Security Innovation and The Ponemon Institute does a regular study, called The State of Application Security. This study investigates the difference in application security beliefs between developers, security professionals and company executives. The results are pretty shocking.. Read more…
Posted in Implementing Security, Security Management
-
Information Security Mistakes Employees Make
Not all security breaches happen because of malicious intent. Some of the most common security issues are caused by bad habits ingrained in employees’ day-to-day routines. Thankfully, these potential threats and vulnerabilities are possible to reduce.. Read more…
Posted in Security Awareness
-
Why You Need to Measure Your Application Security Program
If you aren’t measuring your efforts by tracking and analysing your results, you will end up with an incomplete and ineffective program, without the support, funds or focus required to protect your organisation against security breaches.. Read more…
Posted in Security Awareness
-
4-Step’s for Application Security Compliance
Application security is becoming an increasingly crucial requirement for achieving compliance, and without good application security processes in place across your organisation, you can easily fall down on compliance as a result. Here we look at a 4-step action plan to achieve application security compliance.. Read more…
Posted in Security Management, Security Strategy
-
40 Blogs Every Software Developer Should Be Reading
Software developers always need to be upskilling, and increasingly are expected to bring more than just great code to an organisation. There’s hundreds of blogs software developers can read to learn, but it’s difficult knowing where to begin (or even what’s worth reading).. Read more…
Posted in Software Development, Popular Posts
-
How Important is Role Specific Developer Security Training
Most developers specialise in a specific aspect of software and application development; each with their own set of unique benefits and potential security vulnerabilities.. Read more…
Posted in Implementing Security, Security Management, Data Security Training
-
How to Train Secure Web Application Developers
To ensure that your development team understand the risks associated with web application development, and are armed with the tools to protect your organisation against them, you need to understand how to train secure web developers.. Read more…
Posted in Security Management, Software Development, Data Security Training