Where to deploy new security tools first for maximum effect

question mark cards

You have your eye on a new piece of security technology or service and you want to evaluate it before deciding whether to commit to the effort of a full deployment. Alternatively, you may already be committed to full-scale deployment but wondering where to start. So where should you deploy it first to test it […]

Comment les tests de sécurité d’applications doivent changer dans un monde DevOps world agile

security-text-on-screen

Dans le contexte actuel de la cyber sécurité, il est essentiel d’élaborer une stratégie de sécurité qui couvre tous les angles d’attaque. Les entreprises doivent en permanence évaluer leur niveau de préparation et améliorer la gestion et les processus pour avoir toujours un coup d’avance sur des individus mal intentionnés. Les applications sont une des […]

Here’s why you should use containers

crane-lifting-container-in-the-clouda

In just a few years containers have risen from obscurity to become the way we deliver software. But just why are companies making the move? Let’s go over the basics. First and foremost, with containers you can run more application instances on a server than you can with virtual machines (VMs). By their very nature, […]

Vulnerability assessment vs. penetration testing

Even in professional circles, there often seem to be differences of opinion over the value of Vulnerability Assessment versus that of Penetration Testing. This can lead to gigs with over-prescribed scopes, resulting in poor value to the client. Let’s talk about the differences between the two and why each is important in an effort to, […]