pixel

New reference on Clutch: a SaaS HR solution

It was a really exciting experience to provide an application security assessment to a SaaS HR solution, that operates in Silicon Valley. Taking into account the highly sensitive nature of the involved personal data and the high-tech product engineering approach, we...

Стан професії кібербезпеки в Україні (результати опитування)

Свіженької статистики підвезли. Смачної. А статистика в українській індустрії кібербезпеки — справжній дефіцит. Її практично ніхто не збирає, а якщо збирає — є багато питань до її релевантності та правдивості. А якщо статистика релевантна та правдива, розповсюджують...

On the Usefulness of Penetration Testing Methodologies

Let’s imagine for a moment how the “bad guys” are planning their attacks. In the dark basement with cyber-punk posters covering the graffiti on the walls, with a bunch of half-assembled computers lying here and there, malicious hackers gather around the poorly lit...

Leveraging the Strongest Factor in Security (Part II)

Since I’ve written the first part of this post in May, several related articles have appeared in different well-known online resources. The most notable of them, in my opinion, is this piece on Fortune that is trying to bridge infosec and business as many tried...

Leveraging the Strongest Factor in Security (Part I)

In January 2013, Gary McGraw wrote an excellent piece on 13 secure design principles that summarize the high-level ideas any security engineer or architect should be familiar with in order to be called so. Dr. McGraw is of course that smart gentlemen from Cigital who...
Copy link
Powered by Social Snap