• Solutions
  • Products
  • Insights
  • Blog
  • About
  • Get Started

  • How to Identify Secure Software Vendors

    You can invest all the time and money in the world ensuring that your internal systems are safe and secure, but with more and more third party vendors being used each year, it’s all for nothing if they’re not secure too.. Read more…

    Posted in Implementing Security

  • The Impact of BYOD on Organisation Security

    Do you login to your business email account on your personal mobile? Do work on a personal laptop? Access company software from your tablet?. Read more…

    Posted in Security Awareness, Strategy

  • What is The Difference Between Hashing and Encrypting

    Hashing and encrypting are two words that are often used interchangeably, but incorrectly so. Do you understand the difference between the two, and the situations in which you should use one over the other? In today’s post I investigate the key differences between hashing and encrypting, and when each one is appropriate.. Read more…

    Posted in Implementing Security, Popular Posts

  • Five Reasons Executives are Blind to Application Security Risks

    Security Innovation and The Ponemon Institute does a regular study, called The State of Application Security. This study investigates the difference in application security beliefs between developers, security professionals and company executives. The results are pretty shocking.. Read more…

    Posted in Implementing Security, Security Management

  • Information Security Mistakes Employees Make

    Not all security breaches happen because of malicious intent. Some of the most common security issues are caused by bad habits ingrained in employees’ day-to-day routines. Thankfully, these potential threats and vulnerabilities are possible to reduce.. Read more…

    Posted in Security Awareness

  • Why You Need to Measure Your Application Security Program

    If you aren’t measuring your efforts by tracking and analysing your results, you will end up with an incomplete and ineffective program, without the support, funds or focus required to protect your organisation against security breaches.. Read more…

    Posted in Security Awareness

  • 4-Step’s for Application Security Compliance

    Application security is becoming an increasingly crucial requirement for achieving compliance, and without good application security processes in place across your organisation, you can easily fall down on compliance as a result. Here we look at a 4-step action plan to achieve application security compliance.. Read more…

    Posted in Security Management, Strategy

  • 40 Blogs Every Software Developer Should Be Reading

    Software developers always need to be upskilling, and increasingly are expected to bring more than just great code to an organisation. There’s hundreds of blogs software developers can read to learn, but it’s difficult knowing where to begin (or even what’s worth reading).. Read more…

    Posted in Software Development, Popular Posts

  • How Important is Role Specific Developer Security Training

    Most developers specialise in a specific aspect of software and application development; each with their own set of unique benefits and potential security vulnerabilities.. Read more…

    Posted in Implementing Security, Security Management, Data Security Training

  • How to Train Secure Web Application Developers

    To ensure that your development team understand the risks associated with web application development, and are armed with the tools to protect your organisation against them, you need to understand how to train secure web developers.. Read more…

    Posted in Security Management, Software Development, Data Security Training

  • ← Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • Next →

Categories

Data Security Implementing Security Ransomeware Security Awareness Security Knowledgebase Security Management Software Development Strategy Testing Popular Posts Data Security Training Malware Data Security Basics Compliance
logo
  • Get started
  • About us
  • Blog
  • Consultancy
  • Contact us
  • Careers
  • Security Solutions
  • Enterprise Solutions
  • SRA (Security Risk Advisor)
  • TEAM Academy, Mentor and Professor
  • ISPA (Information Privacy &
    Security Awareness)
  • Insights
  • Clients and Testimonials

Copyright © 2017 Security Innovation Europe​ Limited. Security Risk Advisor is a trademark of​ Security Innovation Europe Group Limited all rights reserved. TEAM Academy, TEAM Professor, TEAM Mentor are trademarks of Security Innovation Inc. (a U.S. company) all rights reserved.

x

Subscribe to our updates to keep ahead with cyber security