Always 100% Ready for Remote Work
The product of a valuable effort over ten years ago
Here is an overview of what our technological architecture and our way of operation are, which...
Secure Cloud as Code
The weakest link in security is not the technology.
Here we want to help you secure your deployments and avoid common mistakes. Infrastructure as...
Attacking Without Announce
Nobody knows, but everything is allowed
We want to guide you about some management policies we suggest that you could take to answer...
The Importance of Pentesting
Protect your company against Hackers, not Lamers
In this article, we will discuss the importance of Pentesting when protecting our applications.
Healthcare in the Clouds
Cloud based systems in healthcare and their issues
Cloud-based systems can be of great benefit to healthcare institutions, but they can also lead...
Dude, Where's My XSS Protection?
Solving Halls of Valhalla Challenge: XSS4
Web security nowadays is a matter of concern. In this article, we explain how to avoid one of...