What to do after being attacked
You don’t want to be a victim, but you can’t always get what you want, as the song says. So how to respond to a cybersecurity breach?
17.12.2018
You don’t want to be a victim, but you can’t always get what you want, as the song says. So how to respond to a cybersecurity breach?
17.12.2018
How to approach penetration tests and offensive security?
17.12.2018
The issue of price is very difficult when it comes to security testing. After all, how to assess its ROI?
17.12.2018
Did you know that a your mindset is one of the defining factors of your company’s security level?
17.12.2018
Quality assurance is quite a flexible concept Quality Assurance is now much more than it used to be Tech giants have already figured it out, which is why they heavily invest in internal testing processes that go way beyond regular QA we used to see in the past. Functional bugs...
07.12.2018
It’s not easy to make a system secure. But it’s easy to overdo with security testing.
07.12.2018
In order to make sure that a security training is effective you need more than just a hired coach.
03.12.2018