How A Mobile Security Assessment Can Improve Privacy And Security For Users

Of the 7.8 billion plus people in the world, it turns out that 5.15 billion are also cell phone users. According to Forbes there are also now 8.9 million mobile apps to run on those billions of phones. Is it no wonder that cyber criminals also target mobile as aggressively as every other target?

BLOG Sep 14

5 Steps To Expose Vulnerabilities With An Application Security assessment

There is a constant battle between cybercriminals and IT security staff especially when it comes to code developed inhouse. The belief that a single missed punctuation or use of a specific (thought to be) trusted open-sourced library or code fragment could potentially open up new security leaks or vulnerabilities is a daily reality as seen with the volume of news touting new breaches. Standard quality practices should also include ongoing security assessments in order to get ahead of this curve.

BLOG Sep 07

Secure Software Development Life Cycles Made Simple

If you lead a software development team you are obviously familiar with Software development Life Cycles (SDLC) methodologies. But it doesn’t matter if you have adopted the Waterfall, V-shaped, Iterative, Spiral, Big Bang or an Agile model, as they will all need some adaptation for security, especially as more cyberattacks are reported daily.

BLOG Aug 31

Continuous Security Assessments Come Of Age

IT Security professionals know that there are always multiple ways to solve a given security challenge. Specific methodologies provide a level of confidence for specific circumstances so it is no surprise that something as important as security assessments also have multiple approaches.

BLOG Aug 24

Insider Threat Awareness

If you have ever traveled to a foreign country, looked for a great new restaurant or went to the horse races for the first time, you probably looked up insider tips to help pave the way to an easier/better experience. Insider access has privilege and therefore is coveted for everything from tips on where to go, what to do and how to avoid problems. This also translates into our cyber world where insiders have access to critical IT resources that may be exploited for financial gain or even just malicious intent.

BLOG Aug 17

Spyware And Stalkerware On The Rise

From Austin Powers and James Bond to Fatal Attraction and Swim Fan, Hollywood has capitalized on spies and stalkers to entertain the world. In the digital world it seems that cybercriminals emulate this with their version of malware. Specifically we are talking about spyware and stalkerware, which seem to be gaining a lot of attention during the pandemic.

BLOG Aug 10

Development Training The Secure Way

Even the best athletes need a coach to maximize their performance, so it is not a far stretch to believe that having a development coach for your software engineering team would push them to great levels. Not just in productivity and performance, but in ensuring everything developed is also secure and the likelihood for cybercriminals to breach is minimized.

BLOG Aug 03

Welcome to The New And Improved nVisium.com

We wanted to give you more reasons to come back to nvisium.com frequently, so we have revamped and relaunched our website. In addition to the latest nVisium offerings for Security Assessments, Software Assurance and Training you can now find more resources and timely content to keep you informed and educated on what’s important for you to succeed in your role in the application, cloud or IoT development process.

BLOG Jul 27

DevSec For IoT

It seems that every day we wake up to new devices being made “smart” by attaching them to the internet and giving them computational capabilities to collect, monitor, analyze and report on data. Did you ever wonder that while these new devices are adding value to your life are they in fact creating even more security vulnerabilities in the process?

BLOG Jul 20

Digital Transformation For Developers

Believe it or not, the concept of digitization was introduced back in 1703 when Gottfried Wilhelm von Leibniz published “Explication de l'Arithmétique Binaire”, but didn’t realize it’s modern potential until the introduction of computers in 1939. Since then we have transcended the digitization of information to the digitization of industries to the digitization of societies. This leads us to today’s ever-changing requirements for more, better and faster.

BLOG Jul 13