National Cybersecurity Awareness Month

Security Innovation is proud to be a National Cybersecurity Awareness Month Champion, dedicated to helping make companies more secure from administrators and developers to IT Security Managers and CISOs.

Get Secure This October & Beyond!

We have a TON of general awareness and application security assets, blog posts, and videos to share with you this month. Check out what's going week by week!

 

WEBINAR:
Security Best Practices for Regular Users

October 4, 2018
2:ooPM ET
Register Today!

This Webinar May Not Be for You

If you already know all about protecting your privacy and security online, this webinar may NOT be for you.

But if you are unsure how best to protect yourself and your family online, you'll want to register - and share with others! 

You will learn:

  • The What and How Behind Your Personal Threat Model
  • Quick and Easy Steps for Password Protection and Two Factor Authentication
  • Everyone’s Watching: How to Manage Your Online Privacy While Remaining Social

Register Here  <https://www.securityinnovation.com/training/it-infrastructure-training?utm_source=email&utm_medium=button_register&utm_campaign=Appsec_Webinar_Fall2018>

Text-Img.jpg

 

4 Things You Should Do Now to Protect Yourself Online

Let Security Innovation show you 4 quick & easy ways to enhance your online safety.  In this tip sheet, we cover:

  • How to use a password manager and a few of the most popular and trusted names
  • The Does and Don'ts for using free WiFi
  • What is Two-Factor Authentication (2FA) and when, where and why should I use it?
  • Safe posting while remaining social - What is safe to share and what is better kept under wraps

Download Tip Sheet

Blog: IoT Security in the Home
by Dinesh Shetty

IoT devices are proliferating our homes, from smart thermostats, light switches, security cameras, even refrigerators, our homes are becoming even more "connected."  With these connections, comes security risk.  How do you minimize these risks to help protect your home and your family?  Read more...

Talk to Your Children About Online Security Infographic

Talk to Your Children About Online Safety

The potential online risks to our children is alarming!  From cyber-bullying, to ransomware, to child predators, where to begin in talking to and educating our kids about everything they could encounter online?

You can install firewalls, restrict access to certain sites, monitor apps on their phone, but that won’t get to the real underlying issues.  Becoming aware of security concerns and safety measures, you can start the conversation with your kids and ultimately instill safe browsing habits.

Download our infographic, Talk to Your Children About Online Security to help start the conversation today!

Text-Img.jpg

Finding Your Inner Evil-Doer

Written by Joe Basirico, SVP of Engineering, this white paper covers what it takes to become a great security tester. Using his years of experience examining and training development teams, Joe has come up with three pillars that every security testing foundation must have: 

  • Imagination - Great imagination extends beyond the ability to imagine a system as it could be, but extends to envision the truly interesting bugs and vulnerabilities in a system. 

  • Complete Knowledge of the System - A successful security tester has deep knowledge about everything that goes on in a computer system and can quickly identify items that are out of place. But most importantly....

  • An Evil Streak - This is the ability to take a potential vulnerability to it's logical end. It's possibly the most important quality in a security tester. Not because it gives you some superhuman ability, but rather because it gives the spark that will drive the other two qualities.

Get The White Paper Now

OWASP Mini Toolkit

We've compiled a few of our top OWASP assets to keep you "in the know" and help secure your organization from the OWASP Top Ten vulnerabilities.

XSS

In this quick 2-minute video, we'll discuss the difference between Stored and Reflective Cross-Site Scripting (XSS) attacks and what you can do to avoid them.

 

What You Really Need to Know

Check out our latest tip sheet to learn more about the 3 new vulnerabilities in the Top Ten as well as those pesky incumbents that continue to wreak havoc on code even after all these years.

OWASP Top Ten: What You Really Need to KNow

SQL Injection

In this quick 2-minute video, we'll go over the basics of SQL injection - what it is, how it can impact your code and organization, and what you can do to protect yourself against it.

 

Blog: Preparing for a Career in Cybersecurity

By Lisa Parcella

October is National Cyber Security Awareness Month and week-two brings us an interesting and very relevant topic. Millions of Rewarding Jobs: Educating for a Career in Cybersecurity.

We can all reap the technological and societal advancements that occur when we diversify the talent pool and bring new and fresh perspectives to the challenges in front of us.  

CLICK TO READ

Blog Post_careers-in-cybersecurity

 

 

Building a Culture of Cybersecurity

cul•ture | \’kәl-chәr\ noun the set of shared attitudes, values, goals, and practices that characterizes an institution or organization.

A strong culture of cybersecurity can complement and work with procedural and technology controls to help organizations be proactive as they build secure software, systems, and networks – as well as help detect and stop potential attacks.

This paper discusses the importance of a strong culture of cybersecurity, and examines ten key activities for building – or improving – that culture within your organization. Download to learn:

  • What is a culture of cybersecurity
  • The benefits of a culture of cybersecurity
  • Ten core activities for building a culture of cybersecurity

Get Free Widget

2018 APPLICATION SECURITY REPORT

Download the Application Security Report and learn about the state of application security, how organizations are protecting their applications, and what tools and best practices IT cybersecurity
teams are prioritizing to find, fix and prevent
vulnerabilities in next-gen apps
.

Despite software being the primary target of attacks, organizations still fall woefully short with even basic security hygiene:

53% lack significant resources to detect and remediate application vulnerabilities

42% blame "rushing to release” for not establishing secure coding procedures

Download 

Based on a comprehensive online survey of IT and cybersecurity professionals in the 400,000-member Information Security Community on LinkedIn, the 2018 Application Security Report has been produced in partnership with Security Innovation.

2018 AppSec Report

INSIDER THREATS

Learn everything you need to know about Insider Threats... in 2 Minutes!