Popular Posts

  • What is The Difference Between Hashing and Encrypting?

    Hashing and encrypting are two words that are often used interchangeably, but incorrectly so. Do you understand the difference between the two, and the situations in which you should use one over the other? In today’s post I investigate the key differences between hashing and encrypting, and when each one is appropriate. More info…

    Posted in Implementing Security, Popular Posts on Oct 31, 2016

  • 40 Blogs Every Software Developer Should Be Reading

    Software developers always need to be upskilling, and increasingly are expected to bring more than just great code to an organisation. There’s hundreds of blogs software developers can read to learn, but it’s difficult knowing where to begin (or even what’s worth reading). More info…

    Posted in Software Development, Popular Posts on Sep 26, 2016

  • Security Experts You Need to follow

    As computers become exponentially more involved in our everyday working lives, security is an increasing concern. More info…

    Posted in Software Development, Data Security Knowledgebase, Popular Posts on Aug 01, 2016

  • What is Penetration Testing and Why is It Important?

    Penetration testing (otherwise known as pentesting) is the process of testing your applications for vulnerabilities, and answering a simple question."What could a hacker do to harm my application, or organisation, out in the real world?" More info…

    Posted in Security Testing, Popular Posts on Jul 25, 2016