Manual vs Automated Code Review
Ensuring our code is secure is a critical part of protecting our applications and we should strive to build applications that are both secure by design and in practice. Many organizations use different approaches to achieve this. Today we’re going to take a look at...Which Role is Right For You?
Today we will look at some of the technical roles that exist within the cybersecurity space. Many newcomers to the field want to dive into the coolest-sounding field straight away, but there are a lot of exciting roles and career opportunities if we just look beyond...
What is Threat Modeling and Why You Should Use it
Threat modeling is a process used to identify potential threats and weaknesses in a system. It involves breaking down a system and examining it to better understand what needs protecting, who might attack it, and how it can be protected. So who needs to be involved?...
