Always be Prepared: Monitor, Analyze and Test your Security

By Michelle Drolet . 11 Oct 2016

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20   This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity. We started down … Continue reading Always be Prepared: Monitor, Analyze and Test your Security

Bugs for cash: Bounty hunters in the new wild west of security

By Michelle Drolet . 20 Apr 2016

How security researchers and programmers hunt software bugs for cash rewards   The business of bug hunting is a potentially lucrative one for both seasoned security researchers and amateurs with an interest in hacking. It’s an area that’s gaining legitimacy thanks to official bug bounty programs and hacking contests, but there’s still a seedy underbelly … Continue reading Bugs for cash: Bounty hunters in the new wild west of security

Build security into your app development

By Michelle Drolet . 17 Nov 2014

Integrate security testing into your dev process now or else face cyber-attacks later The way we develop software has been radically transformed in the last few years. Agility and speed are vital components for any company that wants to compete in the market. In order to achieve that it has proven necessary to break down … Continue reading Build security into your app development

Tags