Friday, September 21st, 2012
According to CERT and OWASP (organisations devoted to ensuring security in the online world), vulnerable software is an easy target for hackers. The most successful attacks result from targeting and exploiting known, unpatched software vulnerabilities and insecure software configurations. Many of these can be avoided when given due consideration in the design and coding phase.

“When building new software, it is imperative that developers give as much consideration to security as they do to all the other main elements (such as user interfaces and performance),” explains Kareem Tawansi, CEO of software development provider, Solentive Software.

In today’s society, software is a vital aspect in any organisation. “As more and more software is being relied upon in business (and the world generally), more people are joining the ranks of the hacker community and the decision not to invest in security (during the development stage) is less justifiable than ever,” explains Kareem.

“It’s roughly 20 times more expensive to fix software in production than while it’s being developed, which makes it a very easy decision to financially justify. It’s as simple as this; it just makes good business sense to focus on it at the beginning,” concludes Kareem.

As new technology emerges and workers instigate the BYOD notion to the workplace, businesses need to proactively approach this situation to guarantee that their environment is secure. With the hacker community on the rise and the threat they pose to business increasing, it is essential to be aware of security issues before applications are deployed.

Contact Profile

Solentive Software

Solentive Software specialises in custom software development and systems integration. You'll benefit from our real-world expertise in software built in .NET and Java that is task-matched for affordability and designed to grow with your business.
Kareem Tawansi
P: 1300 55 30 50


Insecure software, Solentive Software CEO, Kareem Tawansi, BYOD notion, hacker community, software vulnerabilities



More Formats

View QR Code