Mobile Application Security

Mobile Application Security

Mobile Application security focuses on assessing the security posture of applications on various mobile device platforms (i.e. Android, iOS and Windows). Mobile applications are being utilised by businesses across the globe to organise workforces, improve customer service, increase revenue, and connect with users from around the world. Like computers and websites, mobile applications have their[…]

Development pipelines

Integrating Security into your Development Pipelines

Implementing security into an already established and successful development pipelines can be both difficult and intensive. However, ensuring that product delivery also encompasses security through relevant testing is vital for continuous improvement. Our article this week will focus on how you can begin to review and implement security testing into your development pipelines, and how[…]

Ransomware Decryption Service

Our article this week will focus on a project created to help businesses and individuals alike unlock their devices after a ransomware attack. The project, named “No More Ransom!” is a collaboration between National High Tech Crime Unit of Netherlands’ police, the European Crime Centre, Kaspersky and McAfee, and is designed to provide a way[…]

HTTPS

The importance of HTTPS in web applications

Hypertext Transfer Protocol (HTTP) is a fundamental protocol that is used by the World Wide Web for viewing website content on the internet. HTTP allows us to browse the internet and navigate to our favourite websites. HTTP was not initially created with security in mind, and this meant that any information communicated between your computer[…]

Lecturing

Where to Start Cyber Security Training

Cyber security consists of processes and technologies designed to protect systems, networks, people and data from cyber attacks. In the UK, whether at home or at work, the majority of us are reliant on digital communication and online services, and this can result in an exposure to cyber security risks. Although the impact of cybercrime[…]