Popular Posts

What is The Difference Between Hashing and Encrypting

Posted in Implementing Security, Popular Posts on Oct 31, 2016

Hashing and encrypting are two words that are often used interchangeably, but incorrectly so. Do you understand the difference between the two, and the situations in which you should use one over the other? In today's post I investigate the key differences between hashing and encrypting, and when each one is appropriate.

40 Blogs Every Software Developer Should Be Reading

Posted in Software Development, Popular Posts on Sep 26, 2016

Software developers always need to be upskilling, and increasingly are expected to bring more than just great code to an organisation. There's hundreds of blogs software developers can read to learn, but it's difficult knowing where to begin (or even what's worth reading).

Security Experts You Need to follow

Posted in Security Knowledgebase, Software Development, Popular Posts on Aug 01, 2016

As computers become exponentially more involved in our everyday working lives, security is an increasing concern.

What is Penetration Testing and Why is It Important

Posted in Testing, Popular Posts on Jul 25, 2016

Penetration testing (otherwise known as pentesting) is the process of testing your applications for vulnerabilities, and answering a simple question."What could a hacker do to harm my application, or organisation, out in the real world?"