How To Stay Proactive With Your Application Security Assessments In 2021

Applications are the heart of employee and user productivity. There are now literally billions of applications each with a specific function and value. Unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to your critical IT infrastructure and information assets. So, it stands to reason that proactive application security assessments will help ensure your 2021 goes breach-free.

BLOG Jan 11

3 Critical 2021 New Year's Resolutions For CISOs

Since most everyone is ringing in the New Year by sheltering in place, it may provide much needed time for reflection on what is needed to ensure 2021 is better than 2020 on all fronts. While we can’t control the impact of a pandemic, those of us in the IT security space can control how we prepare for the new onslaught of cyberattacks and hacker techniques that are sure to come in 2021.

BLOG Jan 04

Wishing You A Happy, Healthy & Safe New Year

From all of us at nVisium, we would just like to extend a huge note of gratitude to all of our existing customers as well as all of our potentially new customers and partners reading this blog today.

BLOG Dec 28

What A Secure Software development Life Cycle (SDLC) Looks Likee In 2021

It is no secret that 2020 pushed a lot of boundaries on a lot of fronts, especially for development teams. As we slide into 2021 it is a great time to look deeply at our SDLC strategies in order to determine if they still meet current industry best practices or if some tweaks to your strategy are required.

BLOG Dec 21

4 Ways To Assess Your Network Security To Expose Vulnerabilities

Cybercriminals love to target networks, both on-prem and cloud-based to find new ways to gain access to corporate information assets. As network topographies becoming increasingly complex, the challenge of ensuring security becomes magnitudes more difficult. That is the a network security assessment should be one of your most significant elements of your security strategy.

BLOG Dec 14

6 Ways To Make Your Software Security Program More Successful

It should go without saying that the cost of poor software development can be catastrophic. Not just in the security vulnerabilities that may be opened up to cyber attacks but the overall impact to the organization. In fact, a Consortium for IT Software Quality (CISQ) report has the cost of poor quality software in the US in 2018 is approximately $2.84 trillion, so imagine where that number is today.

BLOG Dec 07

Acceleration Digital Transformation With security

As 2020 comes to a close and we still find our organization sin continued lockdowns, many companies are using the time to evaluate and implement new digital transformation projects. But are they also opening the door to cybercriminals with new security vulnerabilities in the process?

BLOG Nov 30

Demystifying DevSecOps eBook

We recently completed a survey that revealed only 35% of respondents classify security awareness training as a ‘top priority’ while working remotely, and nearly half say that their DevOps teams are not experts in understanding how to protect at home wireless networks.

BLOG Nov 23

6 Ways To Make Your DevSec Training Stick In Your Employee's Mind

Poor employee training has been well documented to cost companies significantly in reduced productivity as well as actual hard budget in mistakes and having great employees leave. This problem is even more magnified in the development organization where poor training can not only cost internal budget but may result in an IT security breach that will have an even bigger negative impact.

BLOG Nov 16

Why You Should Assess Security Controls In The Cloud

While cloud computing as a phrase appeared as early as 1996 in a Compaq internal document according to Wikipedia, the first true cloud computing platform was released in 2006 and the movement to cloud based computing has gained strength significantly since then. As you can imagine, this has also increased the interest in new security vulnerabilities opening up to cyber criminals.

BLOG Nov 09