What is Application Security Testing?

In the modern world, there is more demand for applications thansoftware. So, the importance of application security testing has also increased. This testing helps to identify vulnerabilities within the system and to validate a system’s conformance to security requirements. This article discusses why we should use application security testing and the techniques to apply. Read [...]

2018-07-20T07:17:22+00:00 20th July, 2018|Blog, Thought Leadership|

IoT: Security, Privacy and Safety

Security threats of the Internet of Things are broad and potentially even crippling to systems. This article outlines the threats of IoT under three categories; Privacy, Security and Safety using security tools such as data encryption, strong user authentication and standardized tested APIs. Read More

2015-10-05T07:53:20+00:00 5th October, 2015|Blog, Thought Leadership|

Why Do I Need Another Application Security Tool?

Software development is a fast-moving unstoppable juggernaut. So application security has to adapt to changes in the way we build software. This blog outlines when is the right time to add another application security tool? Applications are going to continue to get larger and more complex process increasingly sensitive data, components and frameworks. Read More

2015-08-27T07:37:20+00:00 27th August, 2015|Blog, Thought Leadership|

TVS and ESS announce strategic partnership to provide a complete security solution

PRESS RELEASE Bristol, UK, 16 March 2015 –TVS, a leader in software test and hardware verification solutions, and Embedded Security Solutions, a specialist embedded security consultancy, today announced a strategic partnership to provide asureSECURE a complete security solution from hardened SoC to software applications. For hardware, TVS brings to the partnership its proven expertise in verification [...]

2015-03-28T10:39:52+00:00 16th March, 2015|Press Releases, Thought Leadership|

Why ISO 27001 only sets the floor on cybersecurity?

We will highlight how compliance with standards such as ISO 27001 only sets a floor, not a ceiling on security. Everyone in modern organisations, including the executives, now need at least a basic understanding of cyber security to ensure their responsibilities are being discharged in good faith. We can win this struggle, but we have [...]

2015-02-13T05:32:19+00:00 13th February, 2015|Active Event, Blog, Events|

Perimeter Defences are not sufficient for building secure applications

The paradigm of perimeter (network-centric) defence is now unable to keep up with malicious innovations that target the web applications, and that method of protecting assets is approaching a technical dead-end. Even if you double spending on perimeter defence, only a small increase in security would be achieved, and the return on investment would be [...]

2015-02-12T08:00:34+00:00 12th February, 2015|Active Event, Blog, Events|

Are your Web Apps secure?

Internet security is an area that is not well understood, even by many of your IT staff. This is a golden age for hackers, with breaches increasing at a tremendous rate according to the latest Verizon report. Find out how to protect your business Register for a free Web Application Security briefing here.

2015-02-11T06:26:07+00:00 11th February, 2015|Active Event, Blog, Events|

Are your Web Apps secure?

This talk will use real-life case studies, including a $1 billion breach that cost the CIO and CEO their jobs, and what happens when businesses refuse to pay ransoms to criminal hackers that have taken control of supposedly secure systems. Register for a free Web Application Security briefing here.

2015-02-10T06:50:55+00:00 10th February, 2015|Active Event, Blog, Events|

Find out if your web apps are secure

If your company writes or uses software connected to the internet then this briefing will inform you of the security threats you face, your responsibilities in respect of those threats and give practical suggestions on how to discharge those responsibilities effectively Register for a free Web Application Security briefing here.

2015-02-09T09:59:51+00:00 9th February, 2015|Active Event, Blog, Events|

Briefing on web application security

TVS are pleased to announce the availability of the slides and recording of our recent briefing on web application security from security expert Declan O’Riordan . Declan is Head of Security Testing at TVS and winner of the prestigious “Best Paper” and “Best Session” awards at the 2015 EuroSTAR conference on Software Testing If your [...]

2015-01-28T10:58:14+00:00 27th January, 2015|Active Event, Blog|
The T&VS newsletters inform you about industry news, events and information from T&VS. No spam, we promise and it is always easy to unsubscribe.
We never share your information. Read our Privacy Statement
Interested in Formal Verification?
Then why not attend the TVS Formal
Verification Bootcamp training?
The 2-day Formal Verification Bootcamp is for design and verification engineers looking to enhance their knowledge of formal verification and to learn how to write effective assertions to find and fix bugs. The course is a mix of presentations and hands-on development exercises.
Bootcamp Enquiry Form
If you are interested in receiving additional information on the course then simply email Mike Bartley (TVS CEO and Course Leader) by entering your details below.
Interested in SystemC?
FREE SystemC UVM Library Now Available
The TVS SystemC UVM library closely mimics UVM but gives users a license free UVM-based verification environment.
Have your product requirements been successfully tested and implemented?
Find out how asureSIGN can help you implement a successful Requirements Driven Verification and Test Strategy by visiting asureSIGN or enter your details and we will be in touch.
Course Dates and Pricing
To receive additional information, including course dates and pricing, please contact our training team who will be happy to help.
Download Request
Please complete the following form then click 'submit' to access the download.
Presentation Request
Please complete the following form then click 'submit' to gain access to the presentations.
Please complete the following form and then click 'submit' to gain access to the download.
Did you get what you were looking?

Let the testing experts help. We will run a FREE QA assessment which will include our top 5 recommendations to help maximise your testing.