{"id":820,"date":"2022-09-02T08:19:17","date_gmt":"2022-09-02T08:19:17","guid":{"rendered":"https:\/\/thesecurityone.com\/?page_id=820"},"modified":"2022-09-07T07:45:43","modified_gmt":"2022-09-07T07:45:43","slug":"cybersecurity-services-scr","status":"publish","type":"page","link":"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-scr\/","title":{"rendered":"Cybersecurity Services"},"content":{"rendered":"<div  id=\"about-1\" class=\"about-1 content-section\" style=\"background-color: #ffffff;\" data-label=\"About\" data-id=\"about--1\" data-export-id=\"about-1\" data-category=\"about\">\n<div  class=\"gridContainer\">\n<div  class=\"row text-center\">\n<div  class=\"section-title-col\" data-type=\"column\">\n<h2  class=\"\"><span  style=\"font-weight: bold; color: #03a9f4;\">Secure Code Review<\/span><\/h2>\n<p  class=\"lead\" style=\"text-align: justify;\">Code review is a software quality assurance activity in which one or several people check a program mainly by viewing and reading parts of its source code, and they do so after implementation or as an interruption of implementation. Code review aims to identify security flaws in the application related to its features and design, along with the exact root causes.\n\n<br >It is the process of auditing the source code of an application to verify that the proper security and logical controls are present, that they work as intended, and that they have been invoked in the right places. Secure code review allows a company to assure application developers are following secure development techniques.\n\n<br >All security code reviews are a combination of human effort and technology support. Tools can be used to perform this task but they always need human verification. Human reviewers are also necessary to fill in for the significant blind spots, which automated tools, simply cannot check.<\/p>\n\n<\/div>\n<\/div>\n<div  class=\"row\">\n<div  class=\"button-holder space-bottom space-bottom-small\" data-type=\"column\"><\/div>\n<div  class=\"col-xs bottom-xs flexbox image-group-bottom-3-img space-bottom-xs center-xs\"><img decoding=\"async\"  class=\"left-img shadow-large-black\" src=\"https:\/\/thesecurityone.com\/wp-content\/plugins\/mesmerize-companion\/theme-data\/mesmerize\/sections\/images\/computer-2569652.jpg\" data-size=\"500x300\"> <img decoding=\"async\"  class=\"center-img shadow-large-black\" src=\"https:\/\/thesecurityone.com\/wp-content\/plugins\/mesmerize-companion\/theme-data\/mesmerize\/sections\/images\/apple-1838564.jpg\" data-size=\"500x300\"> <img decoding=\"async\"  class=\"right-img shadow-large-black\" src=\"https:\/\/thesecurityone.com\/wp-content\/plugins\/mesmerize-companion\/theme-data\/mesmerize\/sections\/images\/laptop-2559795.jpg\" data-size=\"500x300\"><\/div>\n<\/div>\n<\/div>\n<\/div><div  id=\"cta-1\" class=\"cta-centered-bg-section content-section content-section-spacing-medium white-text\" style=\"background-color: #f5fafd;\" data-label=\"Cta\" data-id=\"cta--1\" data-export-id=\"cta-centered-bg-section\" data-category=\"cta\" data-section-ov=\"1\" data-parallax-depth=\"20\">\n<div  class=\"gridContainer\">\n<div  class=\"row text-center\">\n<div  class=\"\" data-type=\"column\">\n<h2  class=\"\">Join us! <span  class=\"font-300\">It will only take a minute<\/span><\/h2>\n<a class=\"button color2\" href=\"https:\/\/thesecurityone.com\/index.php\/contact-us\" target=\"_self\" rel=\"noopener\" data-cp-link=\"1\" data-icon=\"\">GET STARTED TODAY<\/a>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><div  data-label=\"Features\" data-id=\"features--1\" data-export-id=\"features-6\" data-category=\"features\" class=\"features-6 content-section-spacing\" id=\"features-1\" style=\"background-color: rgb(255, 255, 255);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\"> <h2  class=\"\">Our Approach<\/h2> <\/div> <\/div> <div  data-type=\"row\" class=\"row space-bottom\"> <div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-4 \"> <div  class=\"row\"> <div  class=\"col-xs-fit\"> <p  class=\"oval color2\"><span  style=\"color: rgb(3, 169, 244); font-weight: 600;\">1<\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span  style=\"color: rgb(3, 169, 244); font-weight: 600;\">Code Review Preparation<\/span><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"color: rgb(3, 169, 244); font-weight: 600;\">\ufeff<\/span><\/span><\/h4> <p  class=\"\">Define the client\u2019s objective and requirements\n<br >Define the scope<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-4 \"><div  class=\"row\"> <div  class=\"col-xs-fit\"><p  class=\"oval color2\"><span  style=\"color: rgb(3, 169, 244); font-weight: 600;\">2<\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span  style=\"color: rgb(3, 169, 244); font-weight: 600;\">Code Review Discovery and Gathering Information<\/span><\/h4> <p  class=\"\">Gathering all the necessary information about the code sources in the scope<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-4 \"><div  class=\"row\"> <div  class=\"col-xs-fit\"><p  class=\"oval color2\"><span  style=\"color: rgb(3, 169, 244); font-weight: 600;\">3<\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span  style=\"color: rgb(3, 169, 244); font-weight: 600;\">Automatic Static Code Analysis<\/span><\/h4> <p  class=\"\">Using different tools to scan and discover potential vulnerabilities<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-4\"> <div  class=\"row\"> <div  class=\"col-xs-fit\"> <p  class=\"oval color2\"><span style=\"font-weight: 600;\" ><font  color=\"#03a9f4\"><span  style=\"caret-color: rgb(3, 169, 244);\">4<\/span><\/font><\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span style=\"font-weight: 600;\" ><font  color=\"#03a9f4\"><span  style=\"caret-color: rgb(3, 169, 244);\">Manual Static Code Analysis<\/span><\/font><\/span><\/h4> <p  class=\"\">Using custom scripts to find vulnerable sources and channels<\/p><\/div> <\/div><\/div><div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-4\"> <div  class=\"row\"> <div  class=\"col-xs-fit\"> <p  class=\"oval color2\"><span style=\"font-weight: 600;\" ><font  color=\"#03a9f4\"><span  style=\"caret-color: rgb(3, 169, 244);\">5<\/span><\/font><\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span style=\"font-weight: 600;\" ><font  color=\"#03a9f4\"><span  style=\"caret-color: rgb(3, 169, 244);\">Vulnerability Confirmation<\/span><\/font><\/span><\/h4> <p  class=\"\">False positive triage<\/p><\/div> <\/div><\/div><div  class=\"col-xs-12 col-sm-4 col-padding-small-xs col-md-4\"> <div  class=\"row\"> <div  class=\"col-xs-fit\"> <p  class=\"oval color2\"><span style=\"font-weight: 600;\" ><font  color=\"#03a9f4\"><span  style=\"caret-color: rgb(3, 169, 244);\">6<\/span><\/font><\/span><\/p><\/div> <div  class=\"col-xs left-text\" data-type=\"column\"><h4  class=\"color2\"><span style=\"font-weight: 600;\" ><font  color=\"#03a9f4\"><span  style=\"caret-color: rgb(3, 169, 244);\">Reporting<\/span><\/font><\/span><\/h4> <p  class=\"\">Include full details of vulnerabilities with associated risk and remediation recommendations<\/p><\/div> <\/div><\/div><\/div> <div  class=\"row\"> <div  data-type=\"column\" class=\"col-xs-12 text-center\"> <\/div> <\/div><\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>Secure Code Review Code review is a software quality assurance activity in which one or several people check a program mainly by viewing and reading parts of its source code, and they do so after implementation or as an interruption of implementation. Code review aims to identify security flaws in the application related to its&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-scr\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"pro\/page-templates\/full-width-page.php","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-820","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/comments?post=820"}],"version-history":[{"count":0,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/820\/revisions"}],"wp:attachment":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/media?parent=820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}