guides

/guides
13 04, 2018

New Release – Mobile Application Security Verification Standard (MASVS) v1.0

By |2018-04-13T15:57:36+02:00april 13th, 2018|Categories: guides|Kommentarer er skrudd av for New Release – Mobile Application Security Verification Standard (MASVS) v1.0

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, their goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.The project recently published the OWASP [...]

9 01, 2018

Top 10 Considerations for Incident Response

By |2018-01-09T12:59:31+02:00januar 9th, 2018|Categories: guides|Kommentarer er skrudd av for Top 10 Considerations for Incident Response

Breaches happen every day. Is your business prepared? This blog post is based on OWASP Top 10 Guidance for Incident Response, and it will provide a proactive approach to incident response planning.A security incident is an identified occurrence or weakness indicating a possible breach of security policies or failure of safeguards, or a previously unknown [...]

18 12, 2017

5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

By |2017-12-18T13:13:35+02:00desember 18th, 2017|Categories: guides|Kommentarer er skrudd av for 5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

Because the media mostly focus on bigger data breaches, small business owners may assume that hackers only pursue companies with huge amounts of data, and that their own company would be of little interest to hackers. In reality, this is simply not true. Small Businesses - An Interesting TargetSmall businesses store valuable data [...]

6 12, 2017

OWASP Top 10 2017 Released

By |2017-12-06T12:40:48+02:00desember 6th, 2017|Categories: guides|Kommentarer er skrudd av for OWASP Top 10 2017 Released

The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications.A primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the consequences of the most common and most important web [...]

5 10, 2017

Best Practices – TLS / Transport Layer Protection

By |2019-02-20T16:05:43+02:00oktober 5th, 2017|Categories: guides|Kommentarer er skrudd av for Best Practices – TLS / Transport Layer Protection

This blog post is based on OWASP Transport Layer Protection Cheat Sheet, and it will provide simple rules to follow when implementing transport layer protection for an application.Although the concept of TLS is known to many, the actual details and security specific decisions of implementation are often poorly understood and frequently result in insecure [...]

24 08, 2017

10 Critical Security Areas That Software Developers Must Be Aware Of

By |2017-08-24T13:46:05+02:00august 24th, 2017|Categories: guides|Kommentarer er skrudd av for 10 Critical Security Areas That Software Developers Must Be Aware Of

As software developers author the code that makes up a web application, they need to embrace and practice a wide variety of secure coding techniques.All tiers of a web application, the user interface, the business logic, the controller, the database code and more – all need to be developed with security in mind. [...]

20 03, 2017

4 Reasons Why Your Company Should Conduct Network Security Testing

By |2017-03-20T18:28:17+02:00mars 20th, 2017|Categories: guides|Kommentarer er skrudd av for 4 Reasons Why Your Company Should Conduct Network Security Testing

Cyber attacks are a risk for all businesses, regardless of size. Security testing will reveal if your company's security measures can withstand external threats, and whether they are adequate and functioning correctly.Effective network security testing simulates an attack from a malicious source, mapping the possibility of an attack and what consequences it can have [...]

20 01, 2017

Why Should Software Suppliers Conduct Security Testing?

By |2017-01-31T15:12:16+02:00januar 20th, 2017|Categories: guides|Kommentarer er skrudd av for Why Should Software Suppliers Conduct Security Testing?

Most software suppliers are highly skilled at what they do. Their developers are experts at building systems, and making things work. Hackers do however have a completely different mindset. Their focus are on how to break things, and on how to exploit functionality in systems. Because of this, software suppliers can benefit from conducting [...]

12 01, 2017

How Much Does a Network Security Test Cost?

By |2017-01-31T15:13:16+02:00januar 12th, 2017|Categories: guides|Kommentarer er skrudd av for How Much Does a Network Security Test Cost?

Cyber attacks are a risk for all businesses, regardless of size. A security test can reveal if your security measures can withstand external threats, and whether they are adequate and functioning correctly. Effective network security testing simulates an attack from a malicious source. Mapping the possibility of an attack and what consequences it can [...]

10 10, 2016

How Exploit Kits are Attacking You while Surfing Legit Websites

By |2017-01-31T15:32:54+02:00oktober 10th, 2016|Categories: guides|Kommentarer er skrudd av for How Exploit Kits are Attacking You while Surfing Legit Websites

Exploit kits can download malicious code and malware on your computer automatically while you are surfing the Internet. In this blog post we will have a closer look at this devious form of attack. What are exploit kits?Exploit kits are tools that cyber criminals use to scan your system for vulnerabilities, exploit the [...]