How To Improve Mobile Application Security With A Security Application Test

While we discussed “How A Mobile Security Assessment Can Improve Privacy And Security For Users” in a previous blog, we failed to discuss the extent of the reasons and extent of why your mobile applications are vulnerable. It turns out that 10’s of millions of total mobile malware detections trying to infect your mobile apps and hundreds of thousands of new mobile malware show up quarterly as well.

BLOG Oct 19

How Do You Know If Your Mobile Or Web Applications Are Secure?

How many apps do you have on your phone? What about your computer? How often do you use or even depend on them? How secure do you think they are? TechRepublic reported “cyberattacks are helping criminals in total to make more than $1.5 trillion in revenue each year.” Given how profitable cyberattacks have become, it certainly warrants a deeper look into the targets, delivery vehicles and methods for prevention.

BLOG Oct 12

nVisium Is Looking For Great Talent

The security market seems to always be hot, and we at nVisium have enjoyed increasing success. If you are as interested in eliminating application and cloud security vulnerabilities before cyber threats exploit them with proven in-depth security assessments, remediation and training programs., then nVisium is the place you should be.

BLOG Oct 05

Exposing Security Weaknesses Of Your IoT Devices

As a modernized society, we have come to rely on the Internet of Things (IoT) for everything from turning our lights on and off, regulating temperature, and self-driving to a specific address to reporting glucose levels to the doctor or delivering a drone strike to a military target. Done correctly IoT is an effective means to improve our very existence, but when a single vulnerability is exploited by a cybercriminal, it can lead to damage that ranges from the sublime (i.e. nuisance behavior) to the extreme (i.e. theft, destruction or even death).

BLOG Sep 21

How A Mobile Security Assessment Can Improve Privacy And Security For Users

Of the 7.8 billion plus people in the world, it turns out that 5.15 billion are also cell phone users. According to Forbes there are also now 8.9 million mobile apps to run on those billions of phones. Is it no wonder that cyber criminals also target mobile as aggressively as every other target?

BLOG Sep 14

5 Steps To Expose Vulnerabilities With An Application Security assessment

There is a constant battle between cybercriminals and IT security staff especially when it comes to code developed inhouse. The belief that a single missed punctuation or use of a specific (thought to be) trusted open-sourced library or code fragment could potentially open up new security leaks or vulnerabilities is a daily reality as seen with the volume of news touting new breaches. Standard quality practices should also include ongoing security assessments in order to get ahead of this curve.

BLOG Sep 07

Secure Software Development Life Cycles Made Simple

If you lead a software development team you are obviously familiar with Software development Life Cycles (SDLC) methodologies. But it doesn’t matter if you have adopted the Waterfall, V-shaped, Iterative, Spiral, Big Bang or an Agile model, as they will all need some adaptation for security, especially as more cyberattacks are reported daily.

BLOG Aug 31

Continuous Security Assessments Come Of Age

IT Security professionals know that there are always multiple ways to solve a given security challenge. Specific methodologies provide a level of confidence for specific circumstances so it is no surprise that something as important as security assessments also have multiple approaches.

BLOG Aug 24

Insider Threat Awareness

If you have ever traveled to a foreign country, looked for a great new restaurant or went to the horse races for the first time, you probably looked up insider tips to help pave the way to an easier/better experience. Insider access has privilege and therefore is coveted for everything from tips on where to go, what to do and how to avoid problems. This also translates into our cyber world where insiders have access to critical IT resources that may be exploited for financial gain or even just malicious intent.

BLOG Aug 17

Spyware And Stalkerware On The Rise

From Austin Powers and James Bond to Fatal Attraction and Swim Fan, Hollywood has capitalized on spies and stalkers to entertain the world. In the digital world it seems that cybercriminals emulate this with their version of malware. Specifically we are talking about spyware and stalkerware, which seem to be gaining a lot of attention during the pandemic.

BLOG Aug 10