fbpx
Source code review: Why and When? Is it really important?

Source code review: Why and When? Is it really important?

Source code review is a software quality assurance activity in which experts verify a program primarily by analyzing its source code. At least one of the reviewers must not be the author of the source code.It looks obscure from outsideOne of the most important areas...
Assessment after data breach: is it mustard after meat?

Assessment after data breach: is it mustard after meat?

Intrusion into corporate networks has become common, and unfortunately, in most cases, stakeholders only realize it too late. What can you do if you are hacked? How can we prevent another malicious intrusion?Intrusion is rather commonPerhaps the most important...
The external vulnerability assessment and the Black-box approach

The external vulnerability assessment and the Black-box approach

Have you ever wondered how hackers see your external network? What is visible from the outside? Are they able to find vulnerable points? The answer for these questions is an external vulnerability assessment with a Black-box approach. The Black-box assessment is a...
Privilege Escalation and Home Office

Privilege Escalation and Home Office

Working from home may reveal the flaws of applications and processes in use so double-checking the access controls and privilege escalation possibility is highly recommended. Web applications are more popular than ever, people prefer working remotely from home instead...
The applications that we deliver are safe and secure!

The applications that we deliver are safe and secure!

What would happen if a deadline was approaching and it suddenly turned out that principal safety regulations have not been met, and the hardware components have well documented vulnerabilities that are easy to exploit? Most likely the entire project would need to be...