Saturday, November 1, 2014
- Jul 201421
Some things to think about before moving to a cloud based solution.
- May 201311
Inherent weaknesses in penetration tests and why you should not rely only on them for security.
- Dec 201224
Hashing or encryption - which method should you use to store passwords?
- Aug 201311
Controls that should be in place when using production (live) data for testing purposes.
- Mar 201230
Most common attack vectors used by hackers to break into websites and computers are discussed.
- Sep 201118
Overview of data classification, why it is required and how to come up with classification levels.