DevSec Training Challenges Your Organization Should Overcome

Peanut butter and jelly; cookies and milk; DevOps and Security Training… yes, these are actually all things that should go together. While most people understand the first two food references, only those of us in cybersecurity should understand the third. As more press daily herald yet another security breach, it stands to reason that our development practices while may be becoming more agile, they still leave open vulnerabilities exploited by attackers.

BLOG Mar 22

Securing The DevSecOps Pipeline

It doesn’t take a rocket scientist to figure out that implementing best practices for security throughout the entire lifecycle of a software development project will ensure that risk mitigation is at its highest once deployed; but what are the best tools , tips and techniques to ensure this success?

BLOG Mar 15

ROI: Tips For Justifying An Application Risk Assessment

Attempting to justify security expenditures is sometimes an easy internal proposition and can sometimes be a massive challenge as many organizations don’t truly understand the far-ranging impact of a single breach. Justifying return on investments, especially for application risk assessments, starts with an understanding of the domino effect a single breach can have across actual lost data, potential ransomware payments and even public brand confidence and/or stock value.

BLOG Mar 08

nVisium Is Looking For More Great Talent

The security market seems to always be hot, and we at nVisium have enjoyed increasing success. If you are as interested in eliminating application and cloud security vulnerabilities before cyber threats exploit them with proven in-depth security assessments, remediation and training programs., then nVisium is the place you should be.

BLOG Mar 01

5 Considerations To Improve Your Cyber Security Risk Managment

Every Chief Information Security Officer (CISO) as well at IT Security professional understands that job one is cyber security risk mitigation. No one individual or even entire pool of company resources can ever guarantee complete protection from cyber-attacks so the best you can strive for is an idealized version risk mitigation. But that starts requires starting with an understanding of the current and ever-changing risks matched to the current and ever-improving security best practices for secure software development life cycles.

BLOG Feb 22

The Top Mobile App Security Issues in 2020 And How To Avoid Them In 2021

The latest mobile statistics shouldn’t be surprising but they are with over 130 billion app downloads in 2020 alone; the mind still reels at the magnitude. It seems that with the shelter in place requirements imposed by the pandemic in 2020, the population moved to mobile apps to fill in the time.

BLOG Feb 15

What  Is An Application Risk Assessment And How Does It Work?

Applications are the life blood of every corporation today when it comes to managing digital assets, so it stands to reason that they are also the most at-risk area of your IT security strategy. This has given rise to application risk assessments and smart CISOs routinely implement this as a core to their security strategy.

BLOG Feb 08

What Is A Security Assessment And How Does It Work

Most IT security professionals implicitly understand the concept of a security assessment, but some still misunderstand the nuances of effectively assessing and remediating issues across their entire on-premise and cloud-based infrastructure. Sometimes it helps to take a step back and review the basics in order to ensure nothing is left to chance. What you will need is the right tools to accomplish the task of seeing below the surface of the code, and no, you won’t need a high-powered microscope to complete your assessments.

BLOG Feb 01

How To Build A Security Mindset With DevSec Training

Another 2021 New Year’s Resolution should be to take a hard look at your current software engineer training regime. Do you even have one formalized? Do you ensure your developers refresh their skills yearly and update to current best practices? Do you know what it will cost your organization if something is miscoded or a potential security hole gets codded in?

BLOG Jan 25

New Ways To Secure Your DevSecOps Pipeline

As we kickoff 2021 it is important to ensure all security initiatives are optimized, and one of the most valuable will be your DevSecOps. But how do you know if your software engineering team is utilizing today’s latest best practices, tools and techniques? How can you ensure that your DevSec practices have been optimized for today’s cyberthreats?

BLOG Jan 18