How Do You Know If Your Mobile Or Web Applications Are Secure?

How many apps do you have on your phone? What about your computer? How often do you use or even depend on them? How secure do you think they are? TechRepublic reported “cyberattacks are helping criminals in total to make more than $1.5 trillion in revenue each year.” Given how profitable cyberattacks have become, it certainly warrants a deeper look into the targets, delivery vehicles and methods for prevention.

BLOG Oct 12

Insider Threat Awareness

If you have ever traveled to a foreign country, looked for a great new restaurant or went to the horse races for the first time, you probably looked up insider tips to help pave the way to an easier/better experience. Insider access has privilege and therefore is coveted for everything from tips on where to go, what to do and how to avoid problems. This also translates into our cyber world where insiders have access to critical IT resources that may be exploited for financial gain or even just malicious intent.

BLOG Aug 17

Why 6 Security Assessments Are Better Than 1

In addition to helping the world deal with pandemics like COVID-19, the CDC recommends that you get annual health checkups. For many this is a way to prevent illness or catch potential problems before they become too bad. Taking a page from personal health and applying it to the health of your IT infrastructure means that you should consider annual checkups for security vulnerabilities as well. The corollary for a Chief Information Security Officer (CISO) is a security assessment.

BLOG Jun 22

Uncovering Security Vulnerabilities Before You Become A Headline

Some believe that “what you don’t know won’t hurt you.” Others emphatically proclaim that “what you don’t know can (and will) hurt you.” While we would all like to believe the former, the reality is that the latter has proven time and time again to be the case, especially when it comes to security vulnerabilities inadvertently coded into applications, networks, IoT, mobile and cloud infrastructure.

BLOG Jun 01

What Is DevSecOps and Why Should You Care?

Increasingly sophisticated and ever-changing cyber threats require new levels of security assessment, software code development and integration design, oversight, and penetration testing across applications, operating systems, networks, mobile, cloud and the Internet of Things (IoT). This has given rise to a new variation of DevOps that accommodates security. While some call it SecDevOPs and some call it DevOpsSec, the majority have settled on calling it DevSecOps.

BLOG May 18

Internet of Things OWASP Top 10 2018 Released

IoT or the Internet of Things has become a cornerstone of the American consumer and business markets as more and more connected devices are added to the mix every single day. Making sure these systems are secure is extremely important for both security and privacy.  Over the holidays, the 2018 OWASP IoT Top 10 was released.

BLOG Apr 17