top of page

BLOG
Search

Jan 162 min read
Secure by Design
The fundamental challenge in the software industry is a knowledge gap about what "secure" means, how claims should be validated.
15 views0 comments

Nov 29, 20223 min read
Penetration Testing
What is Pen Testing? Penetration testing or pen testing simulates a cyber-attack. This method targets your computer system to identify...
71 views0 comments

Sep 27, 20222 min read
E-commerce Security Threats
According to Juniper Research, the cost of online payment fraud will notably increase by $206 billion over the next five years. This...
35 views0 comments
bottom of page