Wishing You A Happy, Healthy & Safe New Year

From all of us at nVisium, we would just like to extend a huge note of gratitude to all of our existing customers as well as all of our potentially new customers and partners reading this blog today.

BLOG Dec 28

6 Ways To Make Your Software Security Program More Successful

It should go without saying that the cost of poor software development can be catastrophic. Not just in the security vulnerabilities that may be opened up to cyber attacks but the overall impact to the organization. In fact, a Consortium for IT Software Quality (CISQ) report has the cost of poor quality software in the US in 2018 is approximately $2.84 trillion, so imagine where that number is today.

BLOG Dec 07

Acceleration Digital Transformation With security

As 2020 comes to a close and we still find our organization sin continued lockdowns, many companies are using the time to evaluate and implement new digital transformation projects. But are they also opening the door to cybercriminals with new security vulnerabilities in the process?

BLOG Nov 30

How Do You Know If Your Mobile Or Web Applications Are Secure?

How many apps do you have on your phone? What about your computer? How often do you use or even depend on them? How secure do you think they are? TechRepublic reported “cyberattacks are helping criminals in total to make more than $1.5 trillion in revenue each year.” Given how profitable cyberattacks have become, it certainly warrants a deeper look into the targets, delivery vehicles and methods for prevention.

BLOG Oct 12

Insider Threat Awareness

If you have ever traveled to a foreign country, looked for a great new restaurant or went to the horse races for the first time, you probably looked up insider tips to help pave the way to an easier/better experience. Insider access has privilege and therefore is coveted for everything from tips on where to go, what to do and how to avoid problems. This also translates into our cyber world where insiders have access to critical IT resources that may be exploited for financial gain or even just malicious intent.

BLOG Aug 17

Why 6 Security Assessments Are Better Than 1

In addition to helping the world deal with pandemics like COVID-19, the CDC recommends that you get annual health checkups. For many this is a way to prevent illness or catch potential problems before they become too bad. Taking a page from personal health and applying it to the health of your IT infrastructure means that you should consider annual checkups for security vulnerabilities as well. The corollary for a Chief Information Security Officer (CISO) is a security assessment.

BLOG Jun 22

Uncovering Security Vulnerabilities Before You Become A Headline

Some believe that “what you don’t know won’t hurt you.” Others emphatically proclaim that “what you don’t know can (and will) hurt you.” While we would all like to believe the former, the reality is that the latter has proven time and time again to be the case, especially when it comes to security vulnerabilities inadvertently coded into applications, networks, IoT, mobile and cloud infrastructure.

BLOG Jun 01

What Is DevSecOps and Why Should You Care?

Increasingly sophisticated and ever-changing cyber threats require new levels of security assessment, software code development and integration design, oversight, and penetration testing across applications, operating systems, networks, mobile, cloud and the Internet of Things (IoT). This has given rise to a new variation of DevOps that accommodates security. While some call it SecDevOPs and some call it DevOpsSec, the majority have settled on calling it DevSecOps.

BLOG May 18

Internet of Things OWASP Top 10 2018 Released

IoT or the Internet of Things has become a cornerstone of the American consumer and business markets as more and more connected devices are added to the mix every single day. Making sure these systems are secure is extremely important for both security and privacy.  Over the holidays, the 2018 OWASP IoT Top 10 was released.

BLOG Apr 17