The Top Mobile App Security Issues in 2020 And How To Avoid Them In 2021

The latest mobile statistics shouldn’t be surprising but they are with over 130 billion app downloads in 2020 alone; the mind still reels at the magnitude. It seems that with the shelter in place requirements imposed by the pandemic in 2020, the population moved to mobile apps to fill in the time.

BLOG Feb 15

What Is A Security Assessment And How Does It Work

Most IT security professionals implicitly understand the concept of a security assessment, but some still misunderstand the nuances of effectively assessing and remediating issues across their entire on-premise and cloud-based infrastructure. Sometimes it helps to take a step back and review the basics in order to ensure nothing is left to chance. What you will need is the right tools to accomplish the task of seeing below the surface of the code, and no, you won’t need a high-powered microscope to complete your assessments.

BLOG Feb 01

How To Build A Security Mindset With DevSec Training

Another 2021 New Year’s Resolution should be to take a hard look at your current software engineer training regime. Do you even have one formalized? Do you ensure your developers refresh their skills yearly and update to current best practices? Do you know what it will cost your organization if something is miscoded or a potential security hole gets codded in?

BLOG Jan 25

New Ways To Secure Your DevSecOps Pipeline

As we kickoff 2021 it is important to ensure all security initiatives are optimized, and one of the most valuable will be your DevSecOps. But how do you know if your software engineering team is utilizing today’s latest best practices, tools and techniques? How can you ensure that your DevSec practices have been optimized for today’s cyberthreats?

BLOG Jan 18

How To Stay Proactive With Your Application Security Assessments In 2021

Applications are the heart of employee and user productivity. There are now literally billions of applications each with a specific function and value. Unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to your critical IT infrastructure and information assets. So, it stands to reason that proactive application security assessments will help ensure your 2021 goes breach-free.

BLOG Jan 11

3 Critical 2021 New Year's Resolutions For CISOs

Since most everyone is ringing in the New Year by sheltering in place, it may provide much needed time for reflection on what is needed to ensure 2021 is better than 2020 on all fronts. While we can’t control the impact of a pandemic, those of us in the IT security space can control how we prepare for the new onslaught of cyberattacks and hacker techniques that are sure to come in 2021.

BLOG Jan 04

Wishing You A Happy, Healthy & Safe New Year

From all of us at nVisium, we would just like to extend a huge note of gratitude to all of our existing customers as well as all of our potentially new customers and partners reading this blog today.

BLOG Dec 28

6 Ways To Make Your Software Security Program More Successful

It should go without saying that the cost of poor software development can be catastrophic. Not just in the security vulnerabilities that may be opened up to cyber attacks but the overall impact to the organization. In fact, a Consortium for IT Software Quality (CISQ) report has the cost of poor quality software in the US in 2018 is approximately $2.84 trillion, so imagine where that number is today.

BLOG Dec 07

Demystifying DevSecOps eBook

We recently completed a survey that revealed only 35% of respondents classify security awareness training as a ‘top priority’ while working remotely, and nearly half say that their DevOps teams are not experts in understanding how to protect at home wireless networks.

BLOG Nov 23

Why You Should Assess Security Controls In The Cloud

While cloud computing as a phrase appeared as early as 1996 in a Compaq internal document according to Wikipedia, the first true cloud computing platform was released in 2006 and the movement to cloud based computing has gained strength significantly since then. As you can imagine, this has also increased the interest in new security vulnerabilities opening up to cyber criminals.

BLOG Nov 09