TMCnet News

World Leader in App Security Training and Vulnerability Assessment Provides Five "Must Do" Actions for National Cybersecurity Awareness Month
[October 05, 2017]

World Leader in App Security Training and Vulnerability Assessment Provides Five "Must Do" Actions for National Cybersecurity Awareness Month


Complimentary Webinar and Easy-to-Follow Best Practices Will Help Security, IT and Development Teams Make Their Organizations More Secure Now and in the Future

WILMINGTON, Mass., Oct. 05, 2017 (GLOBE NEWSWIRE) -- Security Innovation, the worldwide leader in application security training and assessment services, today unveiled five easy-to-follow actions for National Cybersecurity Awareness Month (NCSAM) that will make organizations more secure. This guidance will help security, IT and development teams understand the fundamentals needed to protect sensitive data – even in the most challenging environments – and reduce the risks and chaos that result from successful cyberattacks.

One of the most important steps to accomplish during NCSAM will be to attend Security Innovation’s complimentary webinar, “Infrastructure Technology Solutions to Protect Enterprise Applications,” on Tuesday, October 31, 2017 at 1:00 p.m. EDT. The presentation will outline what technologies are currently available to help build and deploy more secure software systems, and also debunk common myths around what each technology can and cannot protect. Click here to register.



Security Innovation’s Five Recommended “Must-Do” Actions for NCSAM:

  1. Remain up-to-date on the latest in security.  Action:  Attend Infrastructure Technology Solutions to Protect Enterprise Applications webinar on October 31, 2017 at 1:00 p.m. EDT.


  2. Everyone in your organization must be vigilant.  Action:  Provide Security Awareness Training for all employees that drives the behavioral change needed to protect sensitive data across your organization every minute of every day.

  3. Don’t give hackers a head start.  Action:  Hackers exploit existing vulnerabilities, to combat this, train your managers, architects, developers and test engineers in secure coding best practices, including in embedded systems, cloud and mobile.  

  4. Go Beyond the Scan. Traditional web application security scanners are great for low risk software.  However, they don't provide the necessary protection when you're dealing with modern application architectures, data formats and other underlying technologies for your higher risk applications.  Action: To avoid this one-size-fits-all trap, use experts to help assess your software security vulnerabilities.

  5. Bring out your developers’ evil sides – teach them to be attackers. Put your developers in the right mindset to prevent hackers from breaking their code in the first place.  Action: Train them in live immersive sandbox environments to see what vulnerable code looks like from the hacker’s point of view.

About Security Innovation                    
Since 2002, organizations have relied on Security Innovation for our unique software and application security expertise to help secure and protect sensitive data in the most challenging environments - automobiles, desktops, web applications, mobile devices and in the cloud. A best in class security training, assessment and consulting provider, Security Innovation has been recognized as a Leader in the Gartner Magic Quadrant for Security Awareness Training for three years in a row. Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit www.securityinnovation.com or connect with us on LinkedIn or Twitter.

Security Innovation Media Contact:

Derek Beckwith

[email protected], 617-331-3567

Primary Logo


[ Back To TMCnet.com's Homepage ]