Sunday, September 21, 2014
- May 201311
Inherent weaknesses in penetration tests and why you should not rely only on them for security.
- Dec 201224
Hashing or encryption - which method should you use to store passwords?
- Aug 201231
Ten information technology principles that every organization should abide by
- Aug 201311
Controls that should be in place when using production (live) data for testing purposes.
- Mar 201230
Most common attack vectors used by hackers to break into websites and computers are discussed.
- Sep 201118
Overview of data classification, why it is required and how to come up with classification levels.