<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Software Security Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/software-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/software-security/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Thu, 01 Aug 2024 18:44:25 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=7.0</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Software Security Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/software-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Manual Testing in Penetration Testing: It&#8217;s Important!</title>
		<link>https://www.vertexcybersecurity.com.au/manual-testing-in-penetration-testing-its-important/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=manual-testing-in-penetration-testing-its-important</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 18:44:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[Manual Testing]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Software Security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8349</guid>

					<description><![CDATA[In today&#8217;s digital age, safeguarding data and systems against cyber threats is more crucial than ever. Penetration testing, or pen testing, is a vital practice to identify and address vulnerabilities. While automated tools are essential, manual testing plays an irreplaceable role. Let’s explore why manual testing is so important in penetration testing. Automated vs. Manual [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Secure Coding Practices Testing in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/secure-coding-practices-testing-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=secure-coding-practices-testing-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 19 Jun 2024 08:45:34 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Secure Coding Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8280</guid>

					<description><![CDATA[In today&#8217;s digital age, cybersecurity is paramount. One of the best ways to ensure your applications are protected is by integrating secure coding practices into your development process. Penetration testing is a crucial step in this process, helping to identify vulnerabilities that could be exploited by malicious actors. This blog will explore the importance of [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Zero-Day Vulnerability Testing for Robust Security</title>
		<link>https://www.vertexcybersecurity.com.au/zero-day-vulnerability-testing-for-robust-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=zero-day-vulnerability-testing-for-robust-security</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Mon, 29 Apr 2024 03:03:55 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<category><![CDATA[Zero-Day Testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7872</guid>

					<description><![CDATA[Introduction: Zero-Day Vulnerability Testing—What Does It Mean? In the world of cyber security, staying ahead of threats is not just important; it&#8217;s essential. Zero-day vulnerability testing represents a critical component of a robust security strategy. This type of testing actively identifies and mitigates vulnerabilities in software and systems before the public knows about them and, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Patch Management in Pen Testing: A Key to Fortified Security</title>
		<link>https://www.vertexcybersecurity.com.au/patch-management-in-pen-testing-a-key-to-fortified-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=patch-management-in-pen-testing-a-key-to-fortified-security</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 22 Mar 2024 03:53:25 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Patch Management]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7784</guid>

					<description><![CDATA[Introduction In the digital age, cyber security stands as a bastion protecting our most sensitive data. At the heart of strengthening these defences lies the practice of penetration testing coupled with robust patch management. This synergy not only identifies vulnerabilities but also ensures their effective remediation, keeping systems secure against evolving threats. The Essence of [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
