Select Page

How do vulnerabilities get into software?

This paper, by application security platform Veracode, addresses the four main causes of vulnerabilities in software today. The authors investigate: insecure coding practises; the ever-shifting threat landscape; the reuse of vulnerable components and code; and...

Social psychology: An under-used tool in cybersecurity

In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance...

Nudging better security

This article explains what ‘behavioural nudging’ is and offers examples of how nudging could be used to encourage desired security behaviours.