The state of application security: DevOps, testing inspire confidence

As the number of threats reported by companies grow, organizations have focused more on security, and application security is an important element of that program. This article elaborates how application security can help to increase the confidence of organizations. Read More Find how T&VS Application Security Services enable you to prevent breaches by protecting and securing your data [...]

2019-01-07T06:22:41+00:007th January, 2019|Blog, Thought Leadership|

Web Application Security: 7 Best Practices You Need to Know

Despite advantages of web application,it has become one of the favourite attack vectors of cybercriminals. Web application security has become one of the topics of greatest interest to security professionals and businesses around the world. This article elaborates how to improve the security of web applications. Read More Find how T&VS Web Application Security Services enable you to prevent [...]

2018-11-12T14:33:47+00:0012th November, 2018|Blog, Thought Leadership|

What is application security? A process and tools for securing software

Now-a-days, application security is getting a lot of attention. Hundreds of tools are available to secure various elements of applications portfolio, from locking down coding changes to assessing inadvertent coding threats. This article elaborates how to improve security of applications using various tools. Read More Find how T&VS asureSECURE services help you build systems that are secure [...]

2018-11-05T06:35:39+00:005th November, 2018|Blog, Thought Leadership|

What is Application Security Testing?

In the modern world, there is more demand for applications thansoftware. So, the importance of application security testing has also increased. This testing helps to identify vulnerabilities within the system and to validate a system’s conformance to security requirements. This article discusses why we should use application security testing and the techniques to apply. Read [...]

2018-07-20T07:17:22+00:0020th July, 2018|Blog, Thought Leadership|

IoT: Security, Privacy and Safety

Security threats of the Internet of Things are broad and potentially even crippling to systems. This article outlines the threats of IoT under three categories; Privacy, Security and Safety using security tools such as data encryption, strong user authentication and standardized tested APIs. Read More

2015-10-05T07:53:20+00:005th October, 2015|Blog, Thought Leadership|

Why Do I Need Another Application Security Tool?

Software development is a fast-moving unstoppable juggernaut. So application security has to adapt to changes in the way we build software. This blog outlines when is the right time to add another application security tool? Applications are going to continue to get larger and more complex process increasingly sensitive data, components and frameworks. Read More

2015-08-27T07:37:20+00:0027th August, 2015|Blog, Thought Leadership|

TVS and ESS announce strategic partnership to provide a complete security solution

PRESS RELEASE Bristol, UK, 16 March 2015 –TVS, a leader in software test and hardware verification solutions, and Embedded Security Solutions, a specialist embedded security consultancy, today announced a strategic partnership to provide asureSECURE a complete security solution from hardened SoC to software applications. For hardware, TVS brings to the partnership its proven expertise in verification [...]

2015-03-28T10:39:52+00:0016th March, 2015|Press Releases, Thought Leadership|

Why ISO 27001 only sets the floor on cybersecurity?

We will highlight how compliance with standards such as ISO 27001 only sets a floor, not a ceiling on security. Everyone in modern organisations, including the executives, now need at least a basic understanding of cyber security to ensure their responsibilities are being discharged in good faith. We can win this struggle, but we have [...]

2015-02-13T05:32:19+00:0013th February, 2015|Active Event, Blog, Events|

Perimeter Defences are not sufficient for building secure applications

The paradigm of perimeter (network-centric) defence is now unable to keep up with malicious innovations that target the web applications, and that method of protecting assets is approaching a technical dead-end. Even if you double spending on perimeter defence, only a small increase in security would be achieved, and the return on investment would be [...]

2015-02-12T08:00:34+00:0012th February, 2015|Active Event, Blog, Events|

Are your Web Apps secure?

Internet security is an area that is not well understood, even by many of your IT staff. This is a golden age for hackers, with breaches increasing at a tremendous rate according to the latest Verizon report. Find out how to protect your business Register for a free Web Application Security briefing here.

2015-02-11T06:26:07+00:0011th February, 2015|Active Event, Blog, Events|