Application Security 101 – HTTP headers

Application Security 101 – HTTP headers

|
1. Strict-Transport-Security The HTTP Strict Transport Security (HSTS) header forces browsers and other agents to interact with web servers over the encrypted HTTPS protocol, which secures users from Man in... The post Application Security 101 – HTTP headers appeared first on Sentrium Security ... Read More

New Exchange RCE vulnerability actively exploited

|
Exchange admins now have another exploit to deal with despite still reeling from a number of high profile attacks this year including ProxyLogon and ProxyShell. A new high severity Remote Code Execution (RCE) exploit for on-premise Exchange Servers has been published and is being actively exploited in the wild. The ... Read More
How effective is secure code review for discovering vulnerabilities?

How effective is secure code review for discovering vulnerabilities?

|
We’ve recently discussed application security and the trend we’re seeing in which companies are increasingly implementing security early on in the Software Development Life Cycle (SDLC). In our blog post exploring the impact of adopting application security, we described a common scenario involving assessing an application that was ready for ... Read More
OWASP Top 10 2021 Released

OWASP Top 10 2021 Released

| | owasp, Uncategorized
The Open Web Application Security Project (OWASP) is a not-for-profit organisation that aims, through community-led open-source projects, to improve the security of web-based software. OWASP develop and manage a public... The post OWASP Top 10 2021 Released appeared first on Sentrium Security ... Read More
What is penetration testing and why is it important to use a CREST-approved provider?

What is penetration testing and why is it important to use a CREST-approved provider?

| | CREST, Crest Partner, Uncategorized
Trusting the effectiveness of your IT security controls is crucial to mitigate risks and malicious access to your systems and the information they store. Penetration testing with a CREST-Approved provider... The post What is penetration testing and why is it important to use a CREST-approved provider? appeared first on Sentrium ... Read More
How secure use of the cloud can digitally transform your business

How secure use of the cloud can digitally transform your business

| | Uncategorized
Companies that move towards digital transformation can innovate more quickly, scale efficiently and reduce risk by implementing cloud security best practices. Businesses must keep up with growing customer expectations and... The post How secure use of the cloud can digitally transform your business appeared first on Sentrium Security ... Read More
How to prepare your business for secure cloud migration

How to prepare your business for secure cloud migration

| | Uncategorized
The cloud holds a lot of potential for organisations. Moving your IT environment to a secure cloud provides flexibility and agility. It allows your team to be more productive and... The post How to prepare your business for secure cloud migration appeared first on Sentrium Security ... Read More
Celebrating Sentrium’s contribution to cyber security

Celebrating Sentrium’s contribution to cyber security

| | Uncategorized
2020 is the year that remote working exploded. Businesses and the general public had to quickly adapt to new ways of working caused by the pandemic. There was suddenly a... The post Celebrating Sentrium’s contribution to cyber security appeared first on Sentrium Security ... Read More