Minimum Secure Products or Minimum Viable Secure Product (MVSP) are guidelines and criteria for creating enterprise or market-ready solutions or services. It consists of a checklist with best practices to follow. The objective is to ensure that B2B … Read more
Security Manager
The Security Manager is responsible for monitoring the security operations on digital platforms or infrastructures.
His/her role covers different aspects of a digital ecosystem, from the implementation of security policies to regulations, to the monitoring of different events, the standardization and verification of security protocols, knowing how to create the procedures for responding to security emergencies, verifying the assessments security, as well as overseeing specific aspects of the work of other figures, such as Developers and IT specialists in different areas.
Find job offers in Job Search for Security Manager.
Tips to Deliver a Strong Cybersecurity Assessment Report
When done correctly, security assessment reports reduce risk and enable businesses to decide where to improve their cyber defenses. In essence, a security assessment report contains conclusions and suggestions. It concerns weaknesses in an IT … Read more
How to Implement a Security Testing Program For Web Applications
As a web app developer, you have enough on your plate already. But with cybercrime on the rise – with 86% of companies experiencing at least one successful cyberattack in 2021 – it’s become more important than ever to test your own security … Read more
Security Testing 101: 9 Tried And Tested Ways to Find Security Flaws in Your Software
Software vulnerabilities can be devastating to your business. All it takes is one cyber attack or phishing scam to tarnish your reputation, bring your organization to a standstill, and prompt your customers to leave en-masse. After all, consumers … Read more
Threat Modeling for Digital Applications: A Quick Guide
Threat Modeling is a security design process to identify potential threats that may impact web and mobile digital applications and determine the correct controls to produce effective countermeasures. Discover essential steps, concepts, and best … Read more
Automating Cybersecurity With Machine Learning
Artificial intelligence and its subfield machine learning play vital roles in cybersecurity today. It is not easy for a business to build robust cybersecurity systems without including these pieces of technology in its plans. Machine learning offers … Read more
What It Takes to Be a SysAdmin
Technology is evolving at a rapid pace, bringing the need for organisations to hire SysAdmins who are up to managing and maintaining computer systems. Nowadays, with the growth of cloud computing and the emergence of new technology trends that are … Read more
7 Ways to Optimize SCADA Cybersecurity
As the name implies, Supervisory Control and Data Acquisition (SCADA) networks house critical systems — including computers and applications — that control, facilitate, or handle essential services. They’re used to manage many critical infrastructure … Read more
Why Has Web App Security Become a Major Concern in Recent Times?
Web Application Security: Importance and Tools to Secure your Product Web applications are being attacked and the number has just increased in recent times. There is an increase of more than 800% on web applications … Read more
7 Mitigation Strategies to Address IoT Security Risk
Before diving into IoT security risk, let's make a quick recap: The invention of the internet and its subsequent applications for online-based technology have drastically changed our understanding of digital tech. The implementation of Wi-Fi … Read more
The Lifecycle of a Remote Code Execution Security Incident
It's not always easy to understand the trust value of a penetration testing until a critical security incident happens to you. Last year at Codemotion Rome, Giovanni Mellini is Head of Information, systems, and network security at ENAV S.pA., … Read more
Does open source software have a security problem?
You'd be hard-pressed to find a day where a cybersecurity incident doesn't hit the news, whether it's hackers accessing personal data, undertaking a DDoS attack or deploying ransomware. Over the years, security breaches have crippled industries, … Read more
How to Prepare IT Infrastructure For Coworking Spaces
As the world moves away from the model of a traditional workforce, coworking spaces are on the rise. These offices are designed to suit small businesses, freelancers, or even larger companies that work remotely but need to take advantage of physical … Read more
So you want to work in cybersecurity?
There's never been a better time to become a cybersecurity professional. Whether you're working for a bank, startup, government organization, or running your own business, cybersecurity as a career means you'll always be in demand. But how do you get … Read more
Peter Todd: Helping people to solve their problem with Cryptography
When we asked Peter Todd to introduce himself at Blockchain and Crypto Values Conference in Milan, he replied: "I help people to apply cryptography to their problems". Who is Peter Todd Peter Todd is a well known and trusted Bitcoin Core … Read more
Cybersecurity is as much about social engineering as bugs
Not a day passes without news of cybersecurity - a ransomware attack, data theft, DDos attack, a research identified vulnerability, or serious hardware flaw. At this year's Codemotion Amsterdam, Eward Driehuis, (former research chief at … Read more
Life-cycle of a security incident: from detection to response
Giovanni Merlos Mellini is the Head of Information, Systems and Network Security at Enav S.p.A., the Italian Air Navigation Service Provider. He is also the founder of the not-for-profit association Cyber Saiyan and the organiser of RomHack, a free … Read more
5G: what’s in it for developers?
The world of wireless terrestrial telecommunications is on his way to 5G, a new approach to use the radio spectrum that is incompatible with all previous efforts. The main improvements promised by 5G are higher speed, higher number of connected … Read more
5G: what’s in it for security?
What is the perception of security in the brave new 5G world? We asked this question to some CxOs in the cybertech arena. The overall picture is that a large part of the companies is making small investments in the specific area, while some of them … Read more
5G: new satellites could narrow the digital divide – and hide the stars forever
While 5G is only for the highly developed world, other solutions are really inclusive for everybody in the world. Will we still call "Internet" the final result? Over half of the world's population is unconnected. OneWeb are building the world's … Read more