How companies combat software insecurities

How companies combat software insecurities

In most companies, developers are focused on meeting project deadlines, and that often leads to applications that are insecurely coded. Custom development can multiply vulnerabilities. Some 48 percent of developers think they leave vulnerabilities in their code, according to the State of Developer-Driven Security Survey 2022 from Secure Code Warrior.

Decision Point – Episode Five: Secure Your Network

Decision Point – Episode Five: Secure Your Network

Increased use of telemedicine puts many long-term care facilities at risk, and cyber-criminals are already targeting healthcare organizations which can adversely impact health information technology, medical communications, and patient and resident safety. Ryan Wallace from HORNE Cyber joins us on this episode to share 5 best practices to help keep your network secure.

Tim Morgan

Tim Morgan

Tim Morgan is a financial institutions partner at HORNE where he helps banks, credit unions and other financial services companies with external audit, internal audit and risk management solutions. He specializes in identifying process improvements that are practical and solutions-oriented to help position clients for success.