+44 (0)203 88 020 88

Menu

Search

Security operations

Exploring the OWASP Software Assurance Maturity Model (SAMM)

The OWASP Software Assurance Maturity Model (SAMM) was first introduced in 2009 by Pravir Chandra as a practical guide to developing secure software. Since its inception, SAMM has evolved to keep pace with emerging technologies, threats, and industry standards. The most recent iteration of SAMM (Version 2.0), refines its structure and expands its applicability to […]

Exploring the OWASP Software Assurance Maturity Model (SAMM) Read More »

10 Common Security Weaknesses and How To Defend Against Them

The mistakes we make and how to fix them – a new report co-authored by the NCSC reveals the 10 most common security weaknesses exploited by hackers. A joint security alert from the National Cyber Security Centre UK (NCSC-UK) was released earlier this month, co-authored by cybersecurity bodies from the USA, Canada, New Zealand, and

10 Common Security Weaknesses and How To Defend Against Them Read More »

Top 15 Most Exploited Vulnerabilities for 2021

The 15 most targeted security vulnerabilities of 2021 have just been published in a joint advisory from the NCSC.  These are the main ways hackers are attacking businesses around the world. Cybersecurity authorities across multiple nations co-authored this publication to provide insight into the exploited vulnerabilities and offer mitigation strategies to deal with the identified

Top 15 Most Exploited Vulnerabilities for 2021 Read More »

What does the Russian invasion of Ukraine mean for UK cyber security?

Russia’s deployment of troops into Ukraine is the physical side of a war that has been raging for some time in cyber space. How might your UK business get caught in the crossfire of this cyber war? On the 15th and 16th of February, the Ukranian banking sector was subject to a distributed denial of

What does the Russian invasion of Ukraine mean for UK cyber security? Read More »

Microsoft upgrades security of Office and Windows

Microsoft has announced several steps they are taking to improve the default security of Office document and Windows systems by protecting them against malicious macros and LOL-bins attacks.   Microsoft Office to block macros for all Internet documents Microsoft is changing the default behaviour of Office applications that can contain VBA macros. Currently when a

Microsoft upgrades security of Office and Windows Read More »

0

No products in the basket.

No products in the basket.