S E C U R I T Y

Loading

Secure Software Development: SSDLC in Software Development
Secure Software Development: SSDLC in Software Development

As the developed software may be using in medical information systems, critical infrastructure systems and financial systems, it is essential to develop software securely. Increasing software security vulnerabilities reveals new approaches to developing secure software. In the software development process, security should not be adopted as the last thing to do; security should start as soon as the software development idea is formed and continue until the latest copy of the created software disappears.  If critical operations are performed, and critical data is stored in the use of the developed software, both the rate of…

Read More
7 Main Threats that Targets Companies
7 Main Threats that Targets Companies

Do you think cyber attackers will only target large companies? Sorry, but you're wrong. Small businesses are also facing cyber threats as large companies. One common mistake small companies do is they believe that they are not worthy of being attacked or will not lose too much when an attack occurs. Nowadays, attackers are using automated tools to gain access to a system. They do not need to focus on your company; they attack hundreds of companies in a small amount of time. Since small companies have less awareness of threats, they have a weak defense. Compared to…

Read More
User Profiling and Anonymization
User Profiling and Anonymization

Profiling is a trending topic for the last couple of years. Every search you have done, web pages you have visited, your mouse movements, even your voice, steps, and heartbeats are being recorded. The reason behind it is to provide a better user experience most of the time. They are showing you the items that you may want to buy, the topics you may want to read not only by your actions but also predicting things using a different kind of algorithms and techniques.   With every mobile application or web page login, we are accepting them…

Read More
6 Differences Between Vulnerability Analysis and Pentest
6 Differences Between Vulnerability Analysis and Pentest

Many people hear Pentest (penetration testing) and vulnerability analysis. Yet, these terms are often confused. This article is about what pentest and vulnerability analysis are, the differences between pentest and vulnerability analysis, and which one you should choose in which situation.   What Is Pentest? Pentest aims to simulate the real-life scenario that can occur during a cyberattack on the firm’s information system hardware, software, and application. Pentest experts use the detected security vulnerabilities to penetrate the system, analyze what can cause these vulnerabilities, and report the results.   Pentest Types …

Read More