7 Tips for Securing the Software Development Environment

7 Tips for Securing the Software Development Environment

Deploy Strong Authentication “Require peer reviews for pull requests and require developers to authenticate with cryptographic keys to authenticate themselves,” says Jack Mannino, CEO at nVisium. Implement Zero-Trust Access for Code Repositories...
Pegasus Spyware Uses iPhone Zero-Click iMessage Zero-Day

Pegasus Spyware Uses iPhone Zero-Click iMessage Zero-Day

Of course, there are other end-to-end encrypted messaging apps to consider when it comes to minimizing your attack surface. Taylor Gulley, senior application security consultant at app security provider nVisium, told Threatpost on Tuesday that disabling widely used...
Hackers targeting outdated versions of Linux in the cloud

Hackers targeting outdated versions of Linux in the cloud

“It’s no surprise that the majority of these attacks are web-based — every website is different and written by different developers with different skill sets. There is a wide range of different frameworks across a multitude of languages with various components that...