On-premises or in the cloud, security is your concern
We bring you a small comparison between on-premises and cloud environments, disclosing their advantages and disadvantages, with a stronger emphasis on security.
It's about time you relied on code-assisted pentesting
Here are some reasons why it would be prudent and beneficial to stop being reluctant to share your code for pentesting with a reputable cybersecurity company.
NIST sheds light on the classification of attacks on AI
Here is an overview of a recent NIST report on adversarial machine learning that could help us understand more about attacks against and from AI systems.
Importance, types, steps, tools of pentesting, and more
Explore the world of penetration testing and gain understanding of how it bolsters your cybersecurity safeguards against emerging threats.
Learn the types, tools, techniques, principles and more
We define security testing and tell you all the basics. These include how to perform it to find vulnerabilities in software applications and other systems.
Outstanding incidents of this type of crime since 2011
Discover some of the most notorious crypto crimes to date, among which we present not only software cyberattacks but also tremendous scams.
Introduction to a trend of just over a decade ago
We share basic knowledge about cryptocurrency and related concepts, including crypto crime, a worrying issue that has gone hand in hand with that paradigm.
Towards an approach that engages more than SCA and SBOM
Understand what a comprehensive software supply chain security approach should aim at and why it is crucial to implement it during your company's SDLCs.
Or what makes the ethical hacker
If ethical hackers can do everything cybercriminals do, what is keeping them from wrongdoing? Let's see how they differ and how that shows in codes of ethics.