Aug 10, 2016 | Research library
This paper, by application security platform Veracode, addresses the four main causes of vulnerabilities in software today. The authors investigate: insecure coding practises; the ever-shifting threat landscape; the reuse of vulnerable components and code; and...
Jul 11, 2016 | Research library
In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance...
Jul 10, 2016 | Research library
This article outlines the importance of human behaviour when it comes to cyber security and offers some recommendations to help create a stronger ‘human firewall’.
Jul 10, 2016 | Research library
This article explains what ‘behavioural nudging’ is and offers examples of how nudging could be used to encourage desired security behaviours.
Jul 4, 2016 | Research library
The Internet-of-Things (IoT) ushers in a new age where the variety and amount of connected, smart devices present in the home is set to increase substantially. While these bring several advantages in terms of convenience and assisted living, security and privacy risks...
Jun 22, 2016 | Research library
Organisational security policies are often written without sufficiently taking in to account the goals and capabilities of the employees that must follow them. Effective security management requires that security managers are able to assess the effectiveness of their...